SOC Manager

SOC Manager

Posted 2 weeks ago by Alignerr

Negotiable
Undetermined
Undetermined
United Kingdom

Summary: The SOC Manager is responsible for assessing and enhancing the operational readiness of the Security Operations Center (SOC) by evaluating detection workflows, response processes, and incident management. This role involves reviewing alerts, identifying gaps in incident response, and validating playbooks to ensure effectiveness. The SOC Manager also supports assessments of SOC maturity and operational rigor. Strong analytical skills and experience in cybersecurity operations are essential for success in this position.

Key Responsibilities:

  • Review detection alerts, triage workflows, and escalation pathways
  • Evaluate completeness, accuracy, and quality of incident response actions
  • Identify gaps in logging, detection coverage, and containment logic
  • Summarize incident patterns, operational bottlenecks, and systemic weaknesses
  • Validate playbooks for clarity, correctness, and real-world feasibility
  • Support recurring assessments of SOC maturity, responsiveness, and operational rigor

Key Skills:

  • Experience in SOC operations, incident response leadership, or cybersecurity operations
  • Strong understanding of detection engineering, response workflows, and incident lifecycle management
  • Clear analytical writing and structured documentation skills
  • Familiarity with SIEM platforms, EDR tools, and cloud-native detection systems

Salary (Rate): £48.00/hr

City: undetermined

Country: United Kingdom

Working Arrangements: undetermined

IR35 Status: undetermined

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

Role Overview

The SOC Manager assesses detection workflows, response processes, playbooks, and overall operational readiness. This role focuses on evaluating incident timelines, triage quality, escalation logic, and consistency across SOC operations.

What You’ll Do

  • Review detection alerts, triage workflows, and escalation pathways
  • Evaluate completeness, accuracy, and quality of incident response actions
  • Identify gaps in logging, detection coverage, and containment logic
  • Summarize incident patterns, operational bottlenecks, and systemic weaknesses
  • Validate playbooks for clarity, correctness, and real-world feasibility
  • Support recurring assessments of SOC maturity, responsiveness, and operational rigor

Must-Have

What You Bring

  • Experience in SOC operations, incident response leadership, or cybersecurity operations
  • Strong understanding of detection engineering, response workflows, and incident lifecycle management
  • Clear analytical writing and structured documentation skills

Nice-to-Have

Familiarity with SIEM platforms, EDR tools, and cloud-native detection systems