300 Soc Manager jobs in the United Kingdom
Senior Security Operations Center (SOC) Manager
Posted 8 days ago
Job Viewed
Job Description
Lead Security Operations Center (SOC) Manager - Remote
Posted 1 day ago
Job Viewed
Job Description
Key Responsibilities:
- Lead and manage the Security Operations Center (SOC) team and operations.
- Develop and implement SOC strategies, policies, and procedures.
- Oversee incident detection, analysis, and response activities.
- Manage and optimize SIEM, EDR, SOAR, and threat intelligence tools.
- Establish and maintain effective threat hunting capabilities.
- Develop and deliver security awareness training for the SOC team.
- Report on SOC performance metrics and security posture to management.
- Foster a culture of continuous learning and improvement within the SOC.
- Collaborate with other security teams and IT departments.
Senior Security Operations Center (SOC) Manager - Remote
Posted 12 days ago
Job Viewed
Job Description
Your duties will include developing and executing incident response plans, conducting post-incident reviews, and implementing lessons learned to enhance security posture. You will lead threat hunting initiatives, proactively seeking out advanced persistent threats and vulnerabilities within the organization's network. Managing the SOC team's performance, providing guidance, mentorship, and professional development opportunities will be key responsibilities. Collaboration with other IT and business units to align security operations with organizational objectives and risk appetite is essential. You will also be responsible for reporting on security metrics, trends, and the overall effectiveness of the SOC to senior management.
The ideal candidate will possess a Master's degree in Cybersecurity, Computer Science, or a related field, coupled with a minimum of 8 years of experience in information security, with at least 3 years in a leadership or management role within a SOC environment. Demonstrated experience in managing security incidents, threat intelligence, and security technologies is paramount. Professional certifications such as CISSP, CISM, CRISC, or GIAC are highly desirable. Exceptional leadership, communication, and interpersonal skills are required to manage a distributed, remote team effectively. You must possess strong analytical and problem-solving abilities, with a strategic mindset to anticipate and mitigate emerging cyber threats. This is a challenging and rewarding opportunity to lead a high-performing remote SOC team. This role is based in Manchester, Greater Manchester, UK , but is a fully remote position.
Security Operations Center (SOC) Analyst
Posted 22 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts and events from various sources, including SIEM, IDS/IPS, firewalls, and endpoints.
- Analyze security incidents to determine their nature, scope, and severity.
- Investigate suspicious activities and potential security breaches in a timely manner.
- Perform initial triage and response actions according to established SOC procedures.
- Escalate critical incidents to senior analysts or incident response teams.
- Document all security events, investigations, and resolutions accurately.
- Contribute to the development and refinement of SOC playbooks and procedures.
- Stay informed about the latest cybersecurity threats, vulnerabilities, and attack techniques.
- Participate in threat hunting exercises to proactively identify potential security risks.
- Collaborate with other security team members to enhance overall security posture.
- Assist in the tuning and optimization of security monitoring tools.
Qualifications:
- Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field, or equivalent practical experience.
- Minimum of 2 years of experience working in a Security Operations Center (SOC) or a similar cybersecurity role.
- Familiarity with SIEM tools (e.g., Splunk, QRadar, ELK Stack) and security event analysis.
- Understanding of networking concepts, TCP/IP, common protocols, and network security.
- Knowledge of common cyber threats, attack vectors, and incident response methodologies.
- Experience with endpoint detection and response (EDR) tools is a plus.
- Strong analytical, problem-solving, and critical thinking skills.
- Excellent communication skills, both written and verbal.
- Ability to work independently, manage time effectively, and maintain focus in a remote setting.
- Relevant certifications such as CompTIA Security+, CySA+, CEH, or GIAC certifications are advantageous.
- This is a fully remote position, allowing you to work from home while contributing to critical security operations.
Senior Security Operations Center (SOC) Analyst
Posted today
Job Viewed
Job Description
Senior Security Operations Center (SOC) Analyst
Posted 1 day ago
Job Viewed
Job Description
Primary responsibilities include:
- Monitoring security alerts and events from various sources, including SIEM, IDS/IPS, firewalls, and endpoint detection and response (EDR) tools.
- Investigating security incidents, performing root cause analysis, and developing effective remediation plans.
- Developing and refining SOC playbooks and standard operating procedures (SOPs) for incident handling.
- Mentoring and guiding junior SOC analysts, providing technical expertise and support.
- Conducting threat hunting activities to proactively identify potential security breaches and vulnerabilities.
- Staying current with the latest threat intelligence, attack vectors, and cybersecurity trends.
- Contributing to the continuous improvement of SOC tools and technologies.
- Collaborating with IT and other departments to implement security best practices and enhance overall security posture.
- Participating in incident response drills and tabletop exercises to test and improve response capabilities.
- Documenting incident findings, actions taken, and recommendations for future prevention.
Senior Security Operations Center (SOC) Analyst
Posted 2 days ago
Job Viewed
Job Description
As a Senior SOC Analyst, you will be at the forefront of defending our clients' digital assets against evolving cyber threats. You will be responsible for monitoring security alerts, analyzing potential threats, conducting incident response, and contributing to the continuous improvement of our SOC operations. Your expertise in threat detection, analysis, and incident management will be critical in safeguarding our clients' sensitive information.
Key Responsibilities:
- Monitor security information and event management (SIEM) systems, intrusion detection/prevention systems (IDPS), and other security tools for suspicious activity.
- Analyze security alerts and logs to identify potential security incidents, prioritizing and escalating as needed.
- Conduct in-depth investigations into security breaches and potential threats, including malware analysis and forensic investigations.
- Develop and execute incident response plans to contain, eradicate, and recover from security incidents.
- Perform threat hunting activities to proactively identify and mitigate potential threats.
- Stay current with the latest cybersecurity threats, vulnerabilities, and attack vectors.
- Contribute to the development and refinement of SOC procedures, playbooks, and detection rules.
- Mentor and guide junior SOC analysts, providing technical expertise and support.
- Collaborate with other security teams, IT departments, and external stakeholders during incident response efforts.
- Generate regular reports on security incidents, trends, and SOC performance metrics.
- Participate in on-call rotations and respond to critical security events as required.
- A Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- A minimum of 5 years of experience in a Security Operations Center (SOC) or similar cybersecurity role.
- Proven experience with SIEM platforms (e.g., Splunk, QRadar, LogRhythm) and other security tools (e.g., EDR, IDS/IPS, firewalls).
- Strong understanding of network protocols, operating systems, and common attack vectors.
- Demonstrated experience in incident response, threat analysis, and digital forensics.
- Excellent analytical and problem-solving skills, with the ability to think critically under pressure.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation is highly desirable.
- Relevant industry certifications such as CISSP, GCIA, GCIH, or OSCP are a strong advantage.
- Exceptional written and verbal communication skills, with the ability to clearly articulate technical information.
- Ability to work independently, manage time effectively, and collaborate within a remote team environment.
Be The First To Know
About the latest Soc manager Jobs in United Kingdom !
Senior Security Operations Center (SOC) Analyst
Posted 3 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor security alerts and events from various sources, including SIEM, IDS/IPS, endpoint detection, and threat intelligence platforms.
- Analyze security incidents to determine scope, impact, and root cause, and initiate appropriate response actions.
- Develop and refine detection rules, playbooks, and Standard Operating Procedures (SOPs) for incident response.
- Conduct threat hunting activities to proactively identify and neutralize advanced persistent threats (APTs) and other sophisticated adversaries.
- Utilize forensic tools and techniques to investigate security breaches and collect evidence.
- Collaborate with incident response teams, IT operations, and external stakeholders during critical incidents.
- Stay current with the latest cybersecurity threats, vulnerabilities, attack vectors, and mitigation strategies.
- Provide mentorship and guidance to junior SOC analysts.
- Contribute to the continuous improvement of SOC tools, processes, and capabilities.
- Participate in on-call rotations as required, ensuring continuous security coverage.
- Bachelor's degree in Computer Science, Information Security, Cybersecurity, or a related field, or equivalent practical experience.
- Minimum of 5 years of experience in a Security Operations Center (SOC) environment, with at least 2 years in a senior or lead analyst role.
- In-depth knowledge of security principles, common attack vectors, and threat landscapes.
- Proficiency with SIEM platforms (e.g., Splunk, QRadar, ArcSight), EDR solutions, and other security tools.
- Experience with network protocols, operating systems (Windows, Linux), and cloud security concepts (AWS, Azure, GCP).
- Strong analytical, problem-solving, and critical thinking skills.
- Excellent communication and documentation skills, with the ability to clearly articulate technical findings.
- Relevant certifications such as CISSP, GIAC (GCIA, GCIH, GCFE), or CEH are highly desirable.
- Ability to work autonomously and collaboratively within a fully remote, global team.
- Demonstrated ability to remain calm and effective under pressure.
Senior Security Operations Center (SOC) Analyst
Posted 4 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security systems (SIEM, IDS/IPS, EDR) for security threats and suspicious activities.
- Analyze security alerts and investigate potential security incidents, determining scope and impact.
- Perform in-depth forensic analysis and malware analysis to understand attack vectors.
- Conduct proactive threat hunting to identify advanced persistent threats (APTs) and zero-day vulnerabilities.
- Develop and refine incident response playbooks and procedures.
- Lead and coordinate incident response efforts, including containment, eradication, and recovery.
- Provide technical guidance and mentorship to junior SOC analysts.
- Stay current with the latest threat intelligence, vulnerabilities, and cybersecurity trends.
- Contribute to the continuous improvement of SOC tools, processes, and capabilities.
- Produce detailed reports on security incidents, findings, and recommendations.
- Bachelor's degree in Computer Science, Cybersecurity, or a related field, or equivalent practical experience.
- Minimum of 5 years of experience in a Security Operations Center (SOC) environment.
- Strong understanding of network protocols, operating systems, and cybersecurity principles.
- Hands-on experience with SIEM tools (e.g., Splunk, QRadar), EDR solutions, and other security technologies.
- Proficiency in incident response, malware analysis, and digital forensics.
- Excellent analytical and problem-solving skills.
- Relevant certifications such as CISSP, GIAC, OSCP, or similar are highly desirable.
- Ability to work effectively in a hybrid work model, balancing remote and office-based duties.
- Strong communication skills, both written and verbal, with the ability to explain complex technical issues to various audiences.
Lead Security Operations Center (SOC) Analyst
Posted 7 days ago
Job Viewed
Job Description
Key Responsibilities:
- Lead and manage the Security Operations Center (SOC) team and its daily operations.
- Oversee the monitoring of security alerts and events from various sources.
- Investigate and respond to security incidents, ensuring timely and effective resolution.
- Conduct threat hunting activities to proactively identify potential security breaches.
- Develop and maintain incident response plans, playbooks, and standard operating procedures (SOPs).
- Manage and configure SIEM, IDS/IPS, EDR, and other security monitoring tools.
- Analyze security logs and network traffic for suspicious activity.
- Perform forensic analysis of security incidents.
- Mentor and train junior SOC analysts.
- Collaborate with other IT and security teams to enhance overall security posture.
- Stay current with the latest cybersecurity threats, vulnerabilities, and mitigation techniques.
- Contribute to security awareness training for employees.
- Bachelor's degree in Computer Science, Cybersecurity, or a related field, or equivalent practical experience.
- Minimum of 7 years of experience in cybersecurity, with at least 3 years in a SOC environment.
- Proven experience in leading a security operations team.
- Expertise in SIEM platforms (e.g., Splunk, QRadar), IDS/IPS, EDR, and firewall management.
- Strong understanding of network protocols, operating systems, and common attack vectors.
- Experience with threat intelligence analysis and incident response methodologies.
- Excellent analytical, problem-solving, and decision-making skills.
- Strong leadership and communication abilities.
- Relevant certifications such as CISSP, GIAC, or CEH are highly desirable.