SOC Manager/Lead in Westminster

SOC Manager/Lead in Westminster

Westminster Full-Time 60000 - 84000 £ / year (est.) No home office possible
Go Premium
Dns Info Ltd

At a Glance

  • Tasks: Lead onsite SOC operations, ensuring seamless communication and effective incident response.
  • Company: Join a leading cybersecurity firm with a focus on innovation and collaboration.
  • Benefits: Competitive salary, flexible working options, and opportunities for professional growth.
  • Why this job: Be at the forefront of cybersecurity, making a real impact in protecting clients.
  • Qualifications: 10-14 years in cybersecurity, with strong leadership and technical skills required.
  • Other info: Dynamic work environment with a focus on continuous improvement and team development.

The predicted salary is between 60000 - 84000 £ per year.

We are seeking a competent Onsite SOC Lead/SOC Manager to operate from the client's premises in London and serve as the Single Point of Contact (SPOC) between the customer and the offshore Mphasis Next-Gen Cyber Fusion Center (Bangalore SOC Team). This individual will play a critical role as the bridge between client stakeholders and the offshore operations, ensuring seamless communication, transparency, and alignment of SOC deliverables. The SOC Lead/Manager will oversee daily BAU SOC functions, drive threat detection and response improvements, provide governance, and ensure the timely delivery of all operational and strategic security services. This position requires strong technical expertise in SIEM/SOAR/EDR technologies (primarily LogRhythm, but exposure to all leading SIEM platforms is essential), robust incident management skills, and exceptional stakeholder communication capabilities.

Responsibilities

  • Act as the primary onsite representative of the SOC and the single point of contact for all cybersecurity operational matters.
  • Ensure all communication to and from the customer is routed, validated, and tracked efficiently with the offshore SOC team.
  • Manage expectations, clarify priorities, and ensure consistent delivery of SOC services as per SLAs and contractual obligations.
  • Conduct regular onsite engagements with customer stakeholders, including service reviews, governance meetings, and ad-hoc consultations.
  • Coordinate offshore teams regarding alerts, incidents, reporting, change requests, and enhancement requirements.
  • Provide real-time visibility to the customer on incident status, ongoing investigations, and risk posture.

SOC Leadership & Operations Management

  • Oversee and guide the offshore SOC analysts (L1, L2, L3, Threat Hunters) to ensure efficient 24×7 operations.
  • Define, maintain, and enforce SOC operational procedures, response processes, and escalation workflows.
  • Monitor SOC performance, quality of investigations, and ensure adherence to SLAs.
  • Coordinate shift-wise activities, staffing coverage, operational handovers, and performance reviews with SOC management.
  • Drive SOC efficiency enhancements and maturing SOC operations from reactive response to proactive threat hunting.

Incident Management & Crisis Response

  • Serve as the Incident Commander for critical/high-severity incidents impacting the client.
  • Lead cross-functional coordination including IT, Network, Cloud, and business units, during major security events.
  • Review incident reports, RCA documents, and ensure lessons learned are implemented across the SOC.
  • Periodically refine IR playbooks and ensure alignment with global frameworks like NIST 800-61 and ISO standards.

Security Technology Oversight

  • Provide advisory and operational oversight for SIEM (LogRhythm primarily), SOAR, EDR, and XDR tools.
  • Work closely with detection engineers to enhance use cases, correlation rules, and detection logic mapped to MITRE ATT&CK.
  • Liaise with customer infrastructure/engineering teams for log onboarding, tool optimization, and integration enhancements.
  • Evaluate and recommend enhancements across SOC tooling, dashboards, and automation workflows.

Threat Intelligence & Proactive Defense

  • Drive proactive security initiatives including threat hunting, behaviour analytics reviews, and continuous tuning of alert logic.
  • Ensure ingestion and effective use of global, contextual, and sector-specific threat intelligence feeds.
  • Support execution of red/blue/purple team activities to validate SOC readiness and improve detection quality.

Governance, Metrics & Reporting

  • Prepare and present operational dashboards, SOC performance reports, and executive summaries.
  • Track KPIs/KRIs such as MTTD, MTTR, SLA adherence, volume trends, and false positive rates.
  • Ensure compliance with audit, regulatory (GDPR, ISO 27001), and internal policy requirements.
  • Maintain documentation, SOPs, process maps, and incident workflows.

People Development & Continuous Improvement

  • Mentor analysts (onsite and offshore) to enhance their skillsets, investigative mindset, and operational maturity.
  • Promote continuous improvement, innovation, and automation within the SOC.
  • Lead SOC maturity assessments and ensure execution of roadmap initiatives aligned with NIST CSF/Gartner models.

Qualifications

  • Bachelor's/Master's degree in Cybersecurity, Computer Science, or Information Security.
  • 10-14 years of experience in cybersecurity operations with 3-5 years in SOC leadership or managerial roles.
  • Strong technical expertise with hands‐on knowledge of:
  • SIEM: LogRhythm (primary), Splunk, Sentinel, Securonix, XSIAM
  • SOAR: Splunk SOAR, XSOAR, Securonix SOAR
  • EDR/XDR: CrowdStrike Falcon, MS Defender, SentinelOne
  • Cloud Security: Azure, AWS, GCP detection and response
  • Deep understanding of:
    • Incident Response frameworks (NIST 800‐61, SANS IR)
    • SOC operating models, MITRE ATT&CK, NIST CSF, ISO 27001
    • Threat intelligence, network forensics, UEBA, DLP solutions
  • Proven experience working with global teams, preferably in managed SOC or MSSP environments.
  • Excellent communication, stakeholder management, and customer-handling skills.
  • Strong analytical ability to translate technical incidents into business‐relevant insights.
  • Preferred Certifications

    • CISSP/CISM
    • GIAC Certifications (GCIH/GCIA/GCFA/GCTI/GMON)
    • CEH or CompTIA CySA+ (as secondary options)
    • LogRhythm Analyst/Administrator Certification (primary tool)
    • Azure Security (AZ‐500/SC‐200)

    Key Performance Indicators (KPIs)

    • SOC uptime, SLA compliance, and operational stability
    • Reduction in MTTD and MTTR
    • Accuracy and quality of incident investigations
    • Decrease in false positives and overall alert fatigue
    • SOC maturity growth over time
    • Successful customer audits and compliance scores
    • Client satisfaction and feedback scores
    • Effective collaboration and alignment between onsite and offshore teams

    SOC Manager/Lead in Westminster employer: Dns Info Ltd

    Mphasis is an exceptional employer, offering a dynamic work environment in the heart of London where innovation meets collaboration. As a SOC Manager/Lead, you will not only lead critical cybersecurity operations but also benefit from a culture that prioritises employee growth through mentorship and continuous improvement initiatives. With access to cutting-edge technologies and a commitment to professional development, Mphasis provides a unique opportunity to make a meaningful impact in the cybersecurity landscape while enjoying a supportive and engaging workplace.
    Dns Info Ltd

    Contact Detail:

    Dns Info Ltd Recruiting Team

    StudySmarter Expert Advice 🤫

    We think this is how you could land SOC Manager/Lead in Westminster

    Tip Number 1

    Network like a pro! Attend industry events, meetups, or webinars related to cybersecurity. It's all about making connections that could lead to job opportunities. Plus, you never know who might have the inside scoop on openings at their company!

    Tip Number 2

    Show off your skills! Create a personal project or contribute to open-source initiatives that showcase your expertise in SIEM, SOAR, or EDR technologies. This not only boosts your portfolio but also gives you something tangible to discuss during interviews.

    Tip Number 3

    Prepare for interviews by practising common SOC-related questions and scenarios. Think about how you'd handle incidents or improve processes. We recommend doing mock interviews with friends or mentors to build confidence and refine your answers.

    Tip Number 4

    Don't forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, we love seeing candidates who are proactive and engaged with our platform. So, get your application in and let’s make it happen!

    We think you need these skills to ace SOC Manager/Lead in Westminster

    SIEM technologies (LogRhythm, Splunk, Sentinel, Securonix, XSIAM)
    SOAR technologies (Splunk SOAR, XSOAR, Securonix SOAR)
    EDR/XDR technologies (CrowdStrike Falcon, MS Defender, SentinelOne)
    Cloud Security (Azure, AWS, GCP detection and response)
    Incident Response frameworks (NIST 800-61, SANS IR)
    SOC operating models
    MITRE ATT&CK framework
    NIST CSF
    ISO 27001 compliance
    Threat intelligence
    Network forensics
    UEBA solutions
    DLP solutions
    Stakeholder management
    Analytical skills
    Communication skills

    Some tips for your application 🫡

    Tailor Your CV: Make sure your CV is tailored to the SOC Manager/Lead role. Highlight your experience with SIEM/SOAR/EDR technologies and any leadership roles you've held. We want to see how your skills align with what we're looking for!

    Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're the perfect fit for this position. Talk about your experience in cybersecurity operations and how you can bridge the gap between our offshore team and client stakeholders.

    Showcase Your Communication Skills: Since this role involves a lot of stakeholder communication, make sure to highlight your communication skills in your application. We love candidates who can clearly articulate complex ideas and foster collaboration between teams.

    Apply Through Our Website: Don't forget to apply through our website! It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows us you're keen on joining the StudySmarter team!

    How to prepare for a job interview at Dns Info Ltd

    Know Your Tech Inside Out

    Make sure you brush up on your knowledge of SIEM, SOAR, and EDR technologies, especially LogRhythm. Be ready to discuss how you've used these tools in past roles and how they can be leveraged to enhance SOC operations.

    Master Stakeholder Communication

    As the SPOC, you'll need to demonstrate exceptional communication skills. Prepare examples of how you've effectively managed stakeholder expectations and facilitated clear communication between teams in previous positions.

    Showcase Your Incident Management Skills

    Be prepared to discuss your experience with incident response frameworks like NIST 800-61. Share specific instances where you've led critical incidents and how you ensured lessons learned were implemented across the team.

    Highlight Your Leadership Experience

    Since this role involves overseeing offshore SOC analysts, it's crucial to showcase your leadership capabilities. Talk about how you've mentored team members, driven operational improvements, and fostered a culture of continuous learning in your previous roles.

    SOC Manager/Lead in Westminster
    Dns Info Ltd
    Location: Westminster
    Go Premium

    Land your dream job quicker with Premium

    You’re marked as a top applicant with our partner companies
    Individual CV and cover letter feedback including tailoring to specific job roles
    Be among the first applications for new jobs with our AI application
    1:1 support and career advice from our career coaches
    Go Premium

    Money-back if you don't land a job in 6-months

    >