At a Glance
- Tasks: Lead cybersecurity operations and ensure seamless communication between clients and offshore teams.
- Company: Join a leading cybersecurity firm in London with a focus on innovation.
- Benefits: Competitive salary, career growth, and opportunities to work with cutting-edge technology.
- Why this job: Be the frontline defender against cyber threats and make a real impact.
- Qualifications: 10+ years in cybersecurity with strong leadership and technical skills required.
- Other info: Dynamic role with opportunities for continuous learning and professional development.
The predicted salary is between 60000 - 84000 £ per year.
We are seeking a competent Onsite SOC Lead / SOC Manager to operate from the client's premises in London and serve as the Single Point of Contact (SPOC) between the customer and the offshore Mphasis Next-Gen Cyber Fusion Center (Bangalore SOC Team). This individual will play a critical role as the bridge between client stakeholders and the offshore operations, ensuring seamless communication, transparency, and alignment of SOC deliverables. The SOC Lead/Manager will oversee daily BAU SOC functions, drive threat detection and response improvements, provide governance, and ensure the timely delivery of all operational and strategic security services. This position requires strong technical expertise in SIEM/SOAR/EDR technologies (primarily LogRhythm, but exposure to all leading SIEM platforms is essential), robust incident management skills, and exceptional stakeholder communication capabilities.
Key Responsibilities
- On-site Customer Interface & SPOC Responsibilities
- Act as the primary onsite representative of the SOC and the single point of contact for all cybersecurity operational matters.
- Ensure all communication to and from the customer is routed, validated, and tracked efficiently with the offshore SOC team.
- Manage expectations, clarify priorities, and ensure consistent delivery of SOC services as per SLAs and contractual obligations.
- Conduct regular onsite engagements with customer stakeholders, including service reviews, governance meetings, and ad-hoc consultations.
- Coordinate offshore teams regarding alerts, incidents, reporting, change requests, and enhancement requirements.
- Provide real-time visibility to the customer on incident status, ongoing investigations, and risk posture.
- SOC Leadership & Operations Management
- Oversee and guide the offshore SOC analysts (L1, L2, L3, Threat Hunters) to ensure efficient 24×7 operations.
- Define, maintain, and enforce SOC operational procedures, response processes, and escalation workflows.
- Monitor SOC performance, quality of investigations, and ensure adherence to SLAs.
- Coordinate shift-wise activities, staffing coverage, operational handovers, and performance reviews with SOC management.
- Drive SOC efficiency enhancements and maturing SOC operations from reactive response to proactive threat hunting.
- Incident Management & Crisis Response
- Serve as the Incident Commander for critical/high‐severity incidents impacting the client.
- Lead cross‐functional coordination including IT, Network, Cloud, and business units, during major security events.
- Review incident reports, RCA documents, and ensure lessons learned are implemented across the SOC.
- Periodically refine IR playbooks and ensure alignment with global frameworks like NIST 800‐61 and ISO standards.
- Security Technology Oversight
- Provide advisory and operational oversight for SIEM (LogRhythm primarily), SOAR, EDR, and XDR tools.
- Work closely with detection engineers to enhance use cases, correlation rules, and detection logic mapped to MITRE ATT&CK.
- Liaise with customer infrastructure/engineering teams for log onboarding, tool optimization, and integration enhancements.
- Evaluate and recommend enhancements across SOC tooling, dashboards, and automation workflows.
- Drive proactive security initiatives including threat hunting, behaviour analytics reviews, and continuous tuning of alert logic.
- Ensure ingestion and effective use of global, contextual, and sector‐specific threat intelligence feeds.
- Support execution of red/blue/purple team activities to validate SOC readiness and improve detection quality.
- Governance, Metrics & Reporting
- Prepare and present operational dashboards, SOC performance reports, and executive summaries.
- Track KPIs/KRIs such as MTTD, MTTR, SLA adherence, volume trends, and false positive rates.
- Ensure compliance with audit, regulatory (GDPR, ISO 27001), and internal policy requirements.
- Maintain documentation, SOPs, process maps, and incident workflows.
- Mentor analysts (onsite and offshore) to enhance their skillsets, investigative mindset, and operational maturity.
- Promote continuous improvement, innovation, and automation within the SOC.
- Lead SOC maturity assessments and ensure execution of roadmap initiatives aligned with NIST CSF / Gartner models.
Required Skills & Qualifications
- Bachelor's/Master's degree in Cybersecurity, Computer Science, or Information Security.
- 10–14 years of experience in cybersecurity operations with 3–5 years in SOC leadership or managerial roles.
- Strong technical expertise with hands‐on knowledge of:
- SOAR: Splunk SOAR, XSOAR, Securonix SOAR
- Cloud Security: Azure, AWS, GCP detection and response
- Proven experience working with global teams, preferably in managed SOC or MSSP environments.
- Excellent communication, stakeholder management, and customer‐handling skills.
- Strong analytical ability to translate technical incidents into business‐relevant insights.
Preferred Certifications
- CISSP / CISMGIAC Certifications (GCIH / GCIA / GCFA / GCTI / GMON)
- CEH or CompTIA CySA+ (as secondary options)
- LogRhythm Analyst/Administrator Certification (primary tool)
- Azure Security (AZ-500 / SC-200)
Key Performance Indicators (KPIs)
- SOC uptime, SLA compliance, and operational stability
- Reduction in MTTD and MTTR
- Accuracy and quality of incident investigations
- Decrease in false positives and overall alert fatigue
- SOC maturity growth over time
- Successful customer audits and compliance scores
- Client satisfaction and feedback scores
- Effective collaboration and alignment between onsite and offshore teams
Summary
The Onsite SOC Lead / Manager is a critical strategic and operational role, responsible for ensuring that the client receives industry‐leading security monitoring and incident response services. As the face of the SOC onsite, this individual must combine strong technical expertise, leadership, communication, and customer management skills to ensure seamless and proactive cyber defence operations.
SOC Manager/ Lead in London employer: Dns Info Ltd
Contact Detail:
Dns Info Ltd Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Manager/ Lead in London
✨Tip Number 1
Network like a pro! Attend industry events, meetups, or webinars related to cybersecurity. It's all about making connections and getting your name out there. You never know who might be looking for someone just like you!
✨Tip Number 2
Prepare for interviews by researching the company and its culture. Understand their SOC operations and be ready to discuss how your experience aligns with their needs. Show them you're not just another candidate; you're the one they need!
✨Tip Number 3
Practice your communication skills! As a SOC Lead, you'll need to convey complex information clearly. Role-play interview scenarios with friends or use online resources to sharpen your delivery. Confidence is key!
✨Tip Number 4
Don't forget to apply through our website! We want to see your application and help you land that dream job. Plus, it shows you're serious about joining our team. Let's make it happen together!
We think you need these skills to ace SOC Manager/ Lead in London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the SOC Manager role. Highlight your experience with SIEM/SOAR/EDR technologies and any leadership roles you've held. We want to see how your skills align with what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're the perfect fit for the SOC Lead position. Share specific examples of your past experiences that relate to the job description, especially around stakeholder communication and incident management.
Showcase Your Technical Skills: Don’t forget to highlight your technical expertise in your application. Mention your hands-on experience with tools like LogRhythm and any relevant certifications. We love seeing candidates who are not just experienced but also passionate about cybersecurity!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, it shows us you’re serious about joining the StudySmarter team!
How to prepare for a job interview at Dns Info Ltd
✨Know Your Tech Inside Out
Make sure you brush up on your knowledge of SIEM, SOAR, and EDR technologies, especially LogRhythm. Be ready to discuss how you've used these tools in past roles and how they can enhance SOC operations.
✨Master the Art of Communication
As a SOC Lead, you'll be the bridge between clients and offshore teams. Practice articulating complex technical concepts in simple terms. Prepare examples of how you've successfully managed stakeholder expectations and facilitated communication.
✨Showcase Your Leadership Skills
Be prepared to discuss your experience in leading SOC teams. Highlight specific instances where you've improved team performance or driven operational changes. Think about how you can demonstrate your ability to mentor and develop analysts.
✨Prepare for Incident Management Scenarios
Expect scenario-based questions about incident management and crisis response. Have examples ready that showcase your analytical skills and how you've handled high-severity incidents, including your approach to refining incident response playbooks.