SOC Incident Response & Threat Hunting Manager
SOC Incident Response & Threat Hunting Manager

SOC Incident Response & Threat Hunting Manager

Full-Time 48000 - 72000 £ / year (est.) No home office possible
F

At a Glance

  • Tasks: Lead incident response and threat hunting initiatives in a dynamic security operations centre.
  • Company: Join Fujitsu, a leader in inclusive and responsible employment.
  • Benefits: Enjoy 25 days annual leave, flexible benefits, and a competitive pension scheme.
  • Why this job: Make a real impact in cybersecurity while mentoring a high-performing team.
  • Qualifications: Strong technical background in digital forensics and incident response required.
  • Other info: Flexible working from day one and excellent career growth opportunities.

The predicted salary is between 48000 - 72000 £ per year.

Job Title: SOC Incident Response & Threat Hunting Manager

Location: Warrington, UK. Travel may be required.

Work Your Way is our approach to flexible working – this is available from day 1 of joining.

We are seeking a highly skilled and experienced SOC Incident Response & Threat Hunting Manager to join our growing Security Operations Centre. This pivotal role will be responsible for leading our Tier 3 Security and Incident Response Analysts, overseeing advanced incident response activities, driving proactive threat hunting initiatives, and providing strategic direction for the Cyber Threat Intelligence (CTI) capability.

This is a hands-on leadership position requiring a strong technical background, exceptional management skills, and a strategic vision for cybersecurity. You will mentor and develop a high-performing team, lead complex incident response engagements from initial detection through post-incident review, and significantly enhance the security posture of our diverse customer base.

The role demands a blend of strategic leadership, deep technical expertise in digital forensics and incident response (DFIR), and a proactive mindset to anticipate and neutralise sophisticated and evolving cyber threats.

Key Responsibilities

  • Provide expert guidance and technical oversight on complex security incidents and threat hunting operations.
  • Lead and coordinate high-severity incident response engagements, acting as the primary incident lead when required. This includes managing cross-functional teams, communications, and critical decision-making under pressure.
  • Ensure all incident response and threat hunting activities are thoroughly documented, with comprehensive reporting delivered to stakeholders.
  • Drive the strategic development and maturity of the CTI team, enhancing their capabilities, visibility, and the actionable insights derived from their research—both internally and for customers.
  • Collaborate with CTI and Detection Engineering teams to translate raw intelligence into actionable threat hunting hypotheses and use cases.
  • Design, execute, and lead advanced threat hunting exercises across varied customer environments, leveraging a deep understanding of adversary TTPs.
  • Integrate threat intelligence into hunting activities to maintain a proactive defence posture informed by current and emerging threats.
  • Develop and deliver high-quality in-house training programmes for the SOC team, including tabletop exercises, forensic challenges, and upskilling sessions on new tools and techniques.
  • Participate in the on-call rotation to support critical incidents.

Your Transferable Skills And Experience

  • Analytical problem-solving: ability to investigate complex data and identify patterns or anomalies
  • Collaboration and teamwork: experience with working across functions to resolve time-pressured issues
  • Communication: ability to explain technical findings clearly to technical and non-technical audiences
  • Adaptability: comfortable learning new tools, processes and technologies quickly
  • Decision making: able to prioritise actions and make judgments under pressure
  • Continuous improvement: committed to documenting lessons learned and improving processes, practices and the skillset of the wider operational team

Your Benefits

  • 25 Days annual leave plus public holidays (3 flexible)
  • Pension – Double matching contributions of up to 10%
  • Life assurance
  • Companywide incentive plans
  • Your choices (Flexible benefits such as increased holidays/travel/dental, critical illness and more)
  • Perks at work – employee discounts
  • Employee assistance programme/ virtual GP
  • Role dependent benefits: Private medical/ company car or car allowance

Recruitment process

The recruitment process consists of two stages of interview. We are a Disability Confident Employer and will offer an interview to disabled applicants who meet the minimum/essential criteria for the role. Email EMEIArecruitment@fujitsu.com if you would like to apply through the Disability Confident Interview Scheme.

About Fujitsu and People

We are recognised as a responsible and inclusive employer: Not only are we a certified Disability Confident Leader, a Times Top 50 employer for Gender Equality, a Top 75 employer for Social Mobility, accredited with the Living Wage Foundation and a signatory for the Race at Work Charter, but we are also committed to the United Nations standards for LGBTI+ and a Stonewall Top 100 Employer.

We are people centric: Our work environments enable you to Be Completely You. Our active people-led Inclusive Community networks are representative of all aspects of diversity and support our innovative approach to inclusion.

Seniority level

  • Mid-Senior level

Employment type

  • Full-time

Job function

  • Information Technology

Industries

  • Information Services, IT Services and IT Consulting, and Software Development

#J-18808-Ljbffr

SOC Incident Response & Threat Hunting Manager employer: Fujitsu

Fujitsu is an exceptional employer, offering a dynamic work culture that prioritises flexibility and inclusivity from day one. With a strong commitment to employee growth through comprehensive training programmes and a focus on collaboration, we empower our teams to excel in their roles while enhancing the security posture of our diverse customer base. Located in Warrington, our Security Operations Centre fosters a supportive environment where innovative thinking thrives, making it an ideal place for professionals seeking meaningful and rewarding careers in cybersecurity.
F

Contact Detail:

Fujitsu Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land SOC Incident Response & Threat Hunting Manager

✨Tip Number 1

Network like a pro! Reach out to your connections in the cybersecurity field, especially those who work at companies you're interested in. A friendly chat can lead to insider info about job openings or even a referral.

✨Tip Number 2

Show off your skills! Create a portfolio showcasing your incident response projects or threat hunting exercises. This gives potential employers a taste of what you can bring to the table and sets you apart from the crowd.

✨Tip Number 3

Prepare for interviews by brushing up on your technical knowledge and soft skills. Practice explaining complex concepts in simple terms, as you'll need to communicate effectively with both techies and non-techies during your role.

✨Tip Number 4

Don't forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, we love seeing candidates who are proactive and engaged with our company.

We think you need these skills to ace SOC Incident Response & Threat Hunting Manager

Incident Response Management
Threat Hunting
Digital Forensics
Cyber Threat Intelligence (CTI)
Team Leadership
Cross-Functional Collaboration
Technical Communication
Analytical Problem-Solving
Adaptability to New Technologies
Decision Making Under Pressure
Continuous Improvement
Advanced Threat Hunting Techniques
Documentation and Reporting
Training and Development

Some tips for your application 🫡

Tailor Your CV: Make sure your CV is tailored to the SOC Incident Response & Threat Hunting Manager role. Highlight your relevant experience in incident response and threat hunting, and don’t forget to showcase your leadership skills. We want to see how you can bring value to our team!

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're the perfect fit for this role. Share specific examples of your past experiences that align with the job description. We love seeing your personality come through, so let us know what excites you about working with us!

Showcase Your Technical Skills: Since this role requires a strong technical background, make sure to highlight your expertise in digital forensics and incident response. Mention any tools or methodologies you’re familiar with, as well as any certifications you hold. We’re keen to see how you can contribute to our proactive defence posture!

Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, you’ll find all the details you need about the role and our company culture there. We can’t wait to hear from you!

How to prepare for a job interview at Fujitsu

✨Know Your Stuff

Make sure you brush up on your technical knowledge, especially around digital forensics and incident response. Be ready to discuss specific incidents you've managed and the strategies you employed. This role demands a strong technical background, so showcasing your expertise will definitely impress.

✨Show Leadership Skills

As a SOC Incident Response & Threat Hunting Manager, you'll need to demonstrate your leadership abilities. Prepare examples of how you've mentored teams or led complex incident responses. Highlight your experience in managing cross-functional teams and making critical decisions under pressure.

✨Communicate Clearly

You’ll be explaining technical findings to both technical and non-technical audiences, so practice articulating complex concepts in simple terms. Think about how you can convey your insights effectively, as communication is key in this role.

✨Be Proactive

This position requires a proactive mindset to anticipate and neutralise threats. Come prepared with ideas on how you would enhance the Cyber Threat Intelligence capabilities and drive threat hunting initiatives. Showing that you think ahead will set you apart from other candidates.

SOC Incident Response & Threat Hunting Manager
Fujitsu

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

F
  • SOC Incident Response & Threat Hunting Manager

    Full-Time
    48000 - 72000 £ / year (est.)

    Application deadline: 2027-09-26

  • F

    Fujitsu

Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>