SOC incident Response & Threat Hunting Manager in Birmingham
SOC incident Response & Threat Hunting Manager

SOC incident Response & Threat Hunting Manager in Birmingham

Birmingham Full-Time 43200 - 72000 ÂŁ / year (est.) No home office possible
Go Premium
Fujitsu

At a Glance

  • Tasks: Lead incident response and threat hunting initiatives in a dynamic security operations centre.
  • Company: Join a forward-thinking tech company committed to inclusivity and innovation.
  • Benefits: Enjoy 25 days of annual leave, flexible benefits, and a competitive pension scheme.
  • Why this job: Make a real impact in cybersecurity while mentoring a high-performing team.
  • Qualifications: Strong technical background in cybersecurity and excellent leadership skills required.
  • Other info: Flexible working from day one and opportunities for continuous professional development.

The predicted salary is between 43200 - 72000 ÂŁ per year.

Location: United Kingdom

Work Your Way is our approach to flexible working – this is available from day 1 of joining. We are seeking a highly skilled and experienced SOC Incident Response & Threat Hunting Manager to join our growing Security Operations Centre. This pivotal role will be responsible for leading our Tier 3 Security and Incident Response Analysts, overseeing advanced incident response activities, driving proactive threat hunting initiatives, and providing strategic direction for the Cyber Threat Intelligence (CTI) capability. This is a hands‑on leadership position requiring a strong technical background, exceptional management skills, and a strategic vision for cybersecurity. You will play a key role in mentoring and developing a high‑performing team, leading complex incident response engagements from initial detection through to post‑incident review, and significantly enhancing the security posture of our diverse customer base. The role demands a unique blend of strategic leadership, deep technical expertise in digital forensics and incident response (DFIR), and a proactive mindset to anticipate and neutralise sophisticated and evolving cyber threats.

Key Responsibilities

  • Provide expert guidance and technical oversight on complex security incidents and threat hunting operations.
  • Lead and coordinate high‑severity incident response engagements, acting as the primary incident lead when required. This includes managing cross‑functional teams, communications, and critical decision‑making under pressure.
  • Ensure all incident response and threat hunting activities are thoroughly documented, with comprehensive reporting delivered to stakeholders.
  • Drive the strategic development and maturity of the CTI team, enhancing their capabilities, visibility, and the actionable insights derived from their research—both internally and for customers.
  • Collaborate closely with CTI and Detection Engineering teams to translate raw intelligence into actionable threat hunting hypotheses and use cases.
  • Design, execute, and lead advanced threat hunting exercises across varied customer environments, leveraging a deep understanding of adversary tactics, techniques, and procedures (TTPs).
  • Integrate threat intelligence into hunting activities to maintain a proactive defence posture informed by current and emerging threats.
  • Develop and deliver high‑quality in‑house training programmes for the SOC team, including tabletop exercises, forensic challenges, and upskilling sessions on new tools and techniques.
  • Participate in the on‑call rotation to support critical incidents.

Your transferable skills and experience

  • Analytical problem‑solving: ability to investigate complex data and identify patterns or anomalies.
  • Collaboration and teamwork: experience with working across functions to resolve time‑pressed issues.
  • Communication: ability to explain technical findings in a clear manner to technical and non-technical audiences.
  • Adaptability: comfortable learning new tools, processes and technologies quickly.
  • Decision making: able to prioritise actions and make judgements under pressure.
  • Continuous improvement: committed to documenting lessons learned and improving processes, practices and the skillset of the wider operational team.

Your benefits

  • 25 Days annual leave plus public holidays (3 flexible)
  • Pension – Double matching contributions of up to 10%
  • Life assurance
  • Companywide incentive plans
  • Your choices (Flexible benefits such as increased holidays / travel / dental critical illness and more)
  • Perks at work – employee discounts
  • Employee assistance programme / virtual GP
  • Role dependent benefits: Private medical / company car or car allowance

Recruitment process

The recruitment process consists of two stages of interview. We are a Disability Confident Employer and will offer an interview to disabled applicants who meet the minimum / essential criteria for the role. Email EMEIArecruitment@fujitsu.com if you would like to apply through the Disability Confident Interview Scheme.

Achieve together

We are recognised as a responsible and inclusive employer: Not only are we a certified Disability Confident Leader, a Times Top 50 employer for Gender Equality, a Top 75 employer for Social Mobility, accredited with the Living Wage Foundation and a signatory for the Race at Work Charter, but we are also committed to the United Nations standards for LGBTI+ and a Stonewall Top 100 Employer. We are people centric: Our work environments enable you to Be Completely You. Our active people‑led Inclusive Community networks are representative of all aspects of diversity and are instrumental in enabling and supporting our innovative approach to inclusion.

SOC incident Response & Threat Hunting Manager in Birmingham employer: Fujitsu

As a leading employer in the cybersecurity sector, we offer a dynamic work environment that prioritises flexibility and inclusivity from day one. Our commitment to employee growth is evident through comprehensive training programmes and mentorship opportunities, ensuring that our SOC Incident Response & Threat Hunting Manager can thrive while making a significant impact on our diverse customer base. With competitive benefits, including generous annual leave and a strong focus on work-life balance, we foster a culture where every team member can be their authentic self and contribute to our mission of enhancing security posture against evolving cyber threats.
Fujitsu

Contact Detail:

Fujitsu Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land SOC incident Response & Threat Hunting Manager in Birmingham

✨Tip Number 1

Network like a pro! Reach out to folks in the cybersecurity field, especially those already working in SOCs. Attend industry events or webinars to make connections and get your name out there.

✨Tip Number 2

Show off your skills! Create a portfolio showcasing your incident response projects or threat hunting exercises. This can really set you apart from other candidates and give us a glimpse of what you can bring to the table.

✨Tip Number 3

Prepare for the interview by brushing up on your technical knowledge and leadership skills. Be ready to discuss real-world scenarios and how you’ve handled complex incidents in the past. We love hearing about your hands-on experience!

✨Tip Number 4

Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re genuinely interested in joining our team at StudySmarter.

We think you need these skills to ace SOC incident Response & Threat Hunting Manager in Birmingham

Incident Response Management
Threat Hunting
Cyber Threat Intelligence (CTI)
Digital Forensics
Technical Oversight
Cross-Functional Team Leadership
Advanced Threat Hunting Techniques
Adversary Tactics, Techniques, and Procedures (TTPs)
Communication Skills
Analytical Problem-Solving
Adaptability
Decision Making
Continuous Improvement
Training and Development

Some tips for your application 🫡

Tailor Your CV: Make sure your CV is tailored to the SOC Incident Response & Threat Hunting Manager role. Highlight your relevant experience in incident response and threat hunting, and don’t forget to showcase your leadership skills. We want to see how you can bring value to our team!

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cybersecurity and how your background aligns with our needs. Be sure to mention specific experiences that demonstrate your analytical problem-solving and collaboration skills.

Showcase Your Technical Skills: In this role, technical expertise is key. Make sure to highlight your knowledge of digital forensics, incident response, and threat intelligence. We’re looking for someone who can lead complex engagements, so don’t hold back on showcasing your hands-on experience!

Apply Through Our Website: We encourage you to apply through our website for a smoother application process. It’s the best way for us to receive your application and ensure it gets the attention it deserves. Plus, it shows you’re keen on joining our team at StudySmarter!

How to prepare for a job interview at Fujitsu

✨Know Your Stuff

Make sure you brush up on your technical knowledge, especially around digital forensics and incident response. Be ready to discuss specific incidents you've managed and the tools you've used. This role demands a strong technical background, so showcasing your expertise will definitely impress.

✨Show Leadership Skills

As a SOC Incident Response & Threat Hunting Manager, you'll need to demonstrate your leadership abilities. Prepare examples of how you've led teams through high-severity incidents or mentored junior analysts. Highlight your experience in managing cross-functional teams and making critical decisions under pressure.

✨Communicate Clearly

You’ll be explaining complex technical findings to both technical and non-technical audiences. Practice articulating your thoughts clearly and concisely. Use examples from your past experiences to illustrate how you’ve successfully communicated during incidents or threat hunting exercises.

✨Emphasise Continuous Improvement

This role is all about enhancing security posture and processes. Be prepared to discuss how you've documented lessons learned and improved practices in your previous roles. Show that you're committed to ongoing learning and development, both for yourself and your team.

SOC incident Response & Threat Hunting Manager in Birmingham
Fujitsu
Location: Birmingham
Go Premium

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

>