SOC Incident Response & Threat Hunting Manager
SOC Incident Response & Threat Hunting Manager

SOC Incident Response & Threat Hunting Manager

Warrington Full-Time 48000 - 72000 £ / year (est.) Home office (partial)
F

At a Glance

  • Tasks: Lead incident response and threat hunting initiatives in a dynamic security operations centre.
  • Company: Join a forward-thinking tech company committed to diversity and inclusion.
  • Benefits: Enjoy 25 days annual leave, flexible benefits, and a supportive work environment.
  • Why this job: Make a real impact in cybersecurity while mentoring a high-performing team.
  • Qualifications: Strong technical background in cybersecurity and excellent leadership skills.
  • Other info: Flexible working from day one and opportunities for continuous improvement.

The predicted salary is between 48000 - 72000 £ per year.

Overview

Job Title: SOC Incident Response & Threat Hunting Manager

Location: Warrington, UK

Travel: May be required

Work Your Way is our approach to flexible working – this is available from day 1 of joining.

We are seeking a highly skilled and experienced SOC Incident Response & Threat Hunting Manager to join our growing Security Operations Centre. This pivotal role will be responsible for leading our Tier 3 Security and Incident Response Analysts, overseeing advanced incident response activities, driving proactive threat hunting initiatives, and providing strategic direction for the Cyber Threat Intelligence (CTI) capability.

This is a hands-on leadership position requiring a strong technical background, exceptional management skills, and a strategic vision for cybersecurity. You will play a key role in mentoring and developing a high-performing team, leading complex incident response engagements from initial detection through to post-incident review, and significantly enhancing the security posture of our diverse customer base.

The role demands a unique blend of strategic leadership, deep technical expertise in digital forensics and incident response (DFIR), and a proactive mindset to anticipate and neutralise sophisticated and evolving cyber threats.

Key Responsibilities

  • Provide expert guidance and technical oversight on complex security incidents and threat hunting operations.
  • Lead and coordinate high-severity incident response engagements, acting as the primary incident lead when required. This includes managing cross-functional teams, communications, and critical decision-making under pressure.
  • Ensure all incident response and threat hunting activities are thoroughly documented, with comprehensive reporting delivered to stakeholders.
  • Drive the strategic development and maturity of the CTI team, enhancing their capabilities, visibility, and the actionable insights derived from their research—both internally and for customers.
  • Collaborate closely with CTI and Detection Engineering teams to translate raw intelligence into actionable threat hunting hypotheses and use cases.
  • Design, execute, and lead advanced threat hunting exercises across varied customer environments, leveraging a deep understanding of adversary tactics, techniques, and procedures (TTPs).
  • Integrate threat intelligence into hunting activities to maintain a proactive defence posture informed by current and emerging threats.
  • Develop and deliver high-quality in-house training programmes for the SOC team, including tabletop exercises, forensic challenges, and upskilling sessions on new tools and techniques.
  • Participate in the on-call rotation to support critical incidents.

Your transferable skills and experience

  • Analytical problem-solving: ability to investigate complex data and identify patterns or anomalies
  • Collaboration and teamwork: experience with working across functions to resolve time pressured issues.
  • Communication: ability to explain technical findings in a clear manner to technical and non-technical audiences.
  • Adaptability: comfortable learning new tools, processes and technologies quickly.
  • Decision making: able to prioritise actions and make judgements under pressure.
  • Continuous improvement: committed to documenting lessons learned and improving processes, practices and the skillset of the wider operational team.

Your benefits

25 Days annual leave plus public holidays (3 flexible)

Pension – Double matching contributions of up to 10%

Life assurance

Companywide incentive plans

Your choices (Flexible benefits such as increased holidays/ travel/ dental critical illness and more)

Perks at work – employee discounts

Employee assistance programme/ virtual GP

Role dependent benefits: Private medical/ company car or car allowance

Recruitment process

The recruitment process consists of two stages of interview

We are a Disability Confident Employer and will offer an interview to disabled applicants who meet the minimum/essential criteria for the role. Email EMEIArecruitment@fujitsu.com if you would like to apply through the Disability Confident Interview Scheme.

Achieve together

We are recognised as a responsible and inclusive employer:

Not only are we a certified Disability Confident Leader, a Times Top 50 employer for Gender Equality, a Top 75 employer for Social Mobility, accredited with the Living Wage Foundation and a signatory for the Race at Work Charter, but we are also committed to the United Nations standards for LGBTI+ and a Stonewall Top 100 Employer.

We are people centric:

Our work environments enable you to Be Completely You. Our active people-led Inclusive Community networks are representative of all aspects of diversity and are instrumental in enabling and supporting our innovative approach to inclusion.

#LifeAtFujitsu

#J-18808-Ljbffr

SOC Incident Response & Threat Hunting Manager employer: Fujitsu

Fujitsu is an exceptional employer, offering a dynamic work culture that prioritises flexibility and inclusivity from day one. With a strong commitment to employee development, you will have access to comprehensive training programmes and opportunities for growth within a supportive environment. Located in Warrington, the company not only provides competitive benefits such as generous annual leave and pension contributions but also fosters a diverse community that champions equality and innovation.
F

Contact Detail:

Fujitsu Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land SOC Incident Response & Threat Hunting Manager

✨Tip Number 1

Network like a pro! Reach out to folks in the cybersecurity field, especially those already working in SOCs. Attend industry events or webinars, and don’t be shy about sliding into DMs on LinkedIn. You never know who might have the inside scoop on job openings!

✨Tip Number 2

Show off your skills! Create a portfolio showcasing your incident response projects or threat hunting exercises. This can be a game-changer during interviews, as it gives you a chance to demonstrate your hands-on experience and technical prowess.

✨Tip Number 3

Prepare for the interview like it’s a high-severity incident! Research the company’s security posture and recent incidents they’ve faced. Be ready to discuss how you would lead their SOC team and tackle specific challenges they might be dealing with.

✨Tip Number 4

Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who take that extra step to connect directly with us.

We think you need these skills to ace SOC Incident Response & Threat Hunting Manager

Incident Response
Threat Hunting
Cyber Threat Intelligence (CTI)
Digital Forensics
Technical Oversight
Team Leadership
Cross-Functional Collaboration
Communication Skills
Analytical Problem-Solving
Adaptability
Decision Making
Continuous Improvement
Training and Development
Understanding of Adversary Tactics, Techniques, and Procedures (TTPs)

Some tips for your application 🫡

Tailor Your Application: Make sure to customise your CV and cover letter to highlight your experience in incident response and threat hunting. We want to see how your skills align with the specific requirements of the SOC Incident Response & Threat Hunting Manager role.

Showcase Your Leadership Skills: Since this is a hands-on leadership position, don’t forget to emphasise your management experience. Share examples of how you've led teams through complex incidents and how you’ve mentored others in the cybersecurity field.

Be Clear and Concise: When writing your application, keep it straightforward. Use clear language to explain your technical expertise and experiences. We appreciate applicants who can communicate complex ideas simply, especially since you'll need to do this with both technical and non-technical audiences.

Apply Through Our Website: We encourage you to submit your application directly through our website. It’s the best way for us to receive your details and ensures you’re considered for the role. Plus, it’s super easy to do!

How to prepare for a job interview at Fujitsu

✨Know Your Stuff

Make sure you brush up on your technical knowledge, especially around digital forensics and incident response. Be ready to discuss specific incidents you've managed and the tools you've used. This role demands a strong technical background, so show them you’ve got it!

✨Show Your Leadership Skills

As a SOC Incident Response & Threat Hunting Manager, you'll need to lead teams under pressure. Prepare examples of how you've successfully managed cross-functional teams during high-severity incidents. Highlight your decision-making process and how you kept communication clear and effective.

✨Be Proactive in Your Approach

This role requires a proactive mindset to anticipate cyber threats. Come prepared with ideas on how you would enhance the Cyber Threat Intelligence (CTI) capabilities. Discuss any threat hunting exercises you've led and how you integrated threat intelligence into your strategies.

✨Communicate Clearly

You’ll need to explain complex technical findings to both technical and non-technical audiences. Practice articulating your thoughts clearly and concisely. Use examples from your past experiences where you successfully communicated intricate details to diverse stakeholders.

SOC Incident Response & Threat Hunting Manager
Fujitsu

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

F
  • SOC Incident Response & Threat Hunting Manager

    Warrington
    Full-Time
    48000 - 72000 £ / year (est.)

    Application deadline: 2027-09-26

  • F

    Fujitsu

Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>