exciting opportunity for a SOCManager to lead and mentor a high-performing Tier 3 Security and Incident Response team within a dynamic SecurityOperationsCentre (SOC). This critical, technical leadership role drives advanced incident response (IR), digital forensics (DFIR), and threat hunting operations across a diverse customer base. The SOCmanager will act as the technical authority for complex investigations, dramatically enhancing cyber resilience and refining detection capabilities. Key Responsibilities Lead & Develop: Mentor and lead senior SOC analysts in effective IR and threat hunting. Incident Ownership: Oversee and coordinate as a SOCManager & Lead on high-severity IR, acting as incident lead and guiding cross … TTPs (Tactics, Techniques, and Procedures). Stakeholder Reporting: Deliver comprehensive incident reports and recommendations. Training: Develop and deliver in-house training, including tabletop exercises and forensic challenges as the SOC Manager. Essential Skills & Experience Proven leadership in SOC IR, SOCManager role and Threat Hunting functions. Strong technical expertise in DFIR (security event analysis, malware More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Fynity
SOCOperationsManager Hemel Hempstead (On-site) Security Clearance – Willing and Able to go through the DV process. Are you an experienced SOCOperationsManager ready to take the next step in your career? This is an exceptional opportunity to lead, shape, and elevate a SecurityOperationsCentre that supports multiple high-profile customers … You’ll have the freedom to make a real impact—defining strategy, driving continual improvement, and mentoring talented analysts to deliver world-class detection and response capabilities. As the SOCOperationsManager, you will: Lead and develop a skilled SOC team, inspiring a culture of continuous learning and technical excellence. Oversee the full lifecycle of security … to senior stakeholders. Ensure operational readiness and contribute to maintaining industry accreditations. Have held budgetary responsibility You will be able to bring a number of the following to this SOCOperationsManager role: Proven experience leading SOCoperations in a 24×7 or multi-client environment. Strong background in incident management, threat detection, and escalation processes. More ❯
Warrington, England, United Kingdom Hybrid/Remote Options
Anson McCade
SOCManager £75,000 - £85,000 + 15% bonus + £6k car allowance Warrington – Remote-first A leading global technology organisation is seeking a SOC Response & Threat Manager to lead their elite Tier 3 security team. As a SOC Response & Threat Manager, you will take ownership of complex security incidents, lead … bonus + £6k car allowance • Generous pension with double-matched contributions • 25 days holiday plus bank holidays • Private medical insurance and flexible benefits To hear more about the SOC Incident Response & Threat Hunting Manager opportunity, get in touch with Connor Smyth at Anson McCade on 020 7780 6706. More ❯
Role overview: Working for a global System Integrator as a SOCManager, you are the senior lead to ensure our state of the art securitycentre is as effective and as efficient as can possibly be. As well as the proactive and responsive management of your team you will also have input for the strategy and future … direction of our operation. Main tasks and responsibilities: Manage Shared SOC for more than 100 FTE across multiple locations providing services to multiple customers 24X7 Drive ongoing and continuous service improvement process Support all Global SOCoperations and initiative Monitor, detect, and respond to global cybersecurity intrusions Document progress throughout the incident response life-cycle Ensure compliance to … for team & vendor management, overall use of resources and initiation of corrective action where required for SecurityOperationsCentre Management, administration & maintenance of security devices under the purview of SOC which consists of state-of-the art technologies Co-ordination with stakeholders, build and maintain positive working relationships with them Pre-requisites: Experience of more than 12 years in More ❯
SOC Incident Response & Threat Hunting Manager Fully Remote (UK-based) | Up to £85,000 + 10–15% Bonus + £6k Car Allowance + Excellent Benefits (Occasional travel to Warrington, approx. once per quarter) Our client is expanding their virtual SecurityOperationsCentre (vSOC) and looking for an experienced SOC Incident Response & Threat Hunting Manager … combining deep expertise in DFIR, threat hunting, and detection engineering with a proactive approach to strengthening security posture across diverse customer environments. The Role Lead and mentor Tier 3 SOC and Incident Response Analysts. Act as the technical lead on high-severity security incidents from initial detection through to post-incident review. Design and execute advanced threat hunting exercises … threat intelligence translates into actionable improvements. Participate in the on-call rota (1 week in 4) to provide leadership during critical incidents. What You’ll Bring Strong background in SOCoperations, incident response, and threat hunting . Experience leading teams or acting as senior escalation within a fast-moving SOC. Technical depth across digital forensics and adversary TTPs. Excellent More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Sopra Steria
We are looking for a dynamic and experienced SOCOperationsManager to lead and shape the delivery of our SecurityOperationsCentre (SOC) services. In this pivotal role, you will be responsible for ensuring the SOC operates at peak performance while driving continual improvement, with a strong focus on ITIL service management principles and full … alignment with CREST standards. Based on-site in Hemel Hempstead, this is an outstanding opportunity for a SOCOperationsManager with proven experience in monitoring and analysing security threats for multiple customers.You will oversee and mentor a skilled team of analysts, fostering a culture of continuous learning, champion best practices in threat detection and incident management, and … play a key role in safeguarding our organisation’s digital environment. Communications with key business partners is key regarding risks, threats and SOC performance. Familiarity with NIST Cybersecurity, MITRE ATT&CK, Splunk, Sentinel and ISO27001 is vital What you will be doing: Lead, mentor, and develop SOC analysts and incident responders. Provide technical direction, conduct performance reviews, and More ❯
SOCManager – Incident Response & Threat Hunting | Fully Remote | Up to £90k + Package This one’s for the player-coach types — hands-on SOC professionals who still love getting involved in the tech but want to step up and lead. You’ll run a virtual SOC supporting critical UK operations, driving incident response, threat hunting … + full benefits You can start without any clearance (SC sponsored) Dual nationals welcome On-call 1 week in 4 🔐 You’ll be: Leading and mentoring a team of SOC engineers Acting as incident commander on major cyber events Hunting for advanced threats and improving detection Driving continuous improvement across tools and processes This suits someone who’s equally … comfortable getting into the detail of incidents as they are coaching others and improving the wider SOC function. If you’ve outgrown the day-to-day analyst grind but don’t want to lose your technical edge — this is that perfect middle ground. More ❯
Job Title: SOC Incident Response & Threat Hunting Manager Location: Remote Salary: £75k - £85k plus 10% bonus and £6k car allowance Mon - Fri as well as an on-call rota - 1 week in 4. Candidates must be willing and eligible to go through SC security clearance for this role Job Description: We are seeking a highly skilled and … experienced SOC Incident Response & Threat Hunting Manager to join our growing SecurityOperations Centre. This pivotal role will be responsible for leading our Tier 3 Security and Incident Response Analysts, overseeing advanced incident response activities, driving proactive threat hunting initiatives, and providing strategic direction for the Cyber Threat Intelligence (CTI) capability. This is a hands-on leadership More ❯
Job Title: SOC Incident Response & Threat Hunting Manager Location: Remote Salary: £75k - £85k plus 10% bonus and £6k car allowance Mon – Fri as well as an on-call rota - 1 week in 4. Candidates must be willing and eligible to go through SC security clearance for this role Job Description: We are seeking a highly skilled and … experienced SOC Incident Response & Threat Hunting Manager to join our growing SecurityOperations Centre. This is a Player Manager position, someone that is able to speak to the customer and keep them updated on the progress of an escalated incident but also someone that comes from a technical Incident response and Forensics background. Key Responsibilities More ❯
An exciting opportunity has arisen for an accomplished SOC Incident Response & Threat Hunting Manager to lead a high-performing team within a dynamic and evolving SecurityOperationsCentre (SOC) environment. This critical role is ideal for a technically proficient cybersecurity professional with a passion for proactive defence, threat intelligence, and strategic leadership. The successful candidate will … part in enhancing cyber resilience, refining detection capabilities, and leading complex investigations from detection through to remediation and review. Key Responsibilities Lead, mentor and develop a team of senior SOC analysts, ensuring the delivery of effective and efficient incident response and threat hunting operations. Oversee and coordinate high-severity incident response engagements, acting as incident lead when required, and … technical accuracy, rapid containment, and detailed documentation throughout. Drive the ongoing development and maturity of the Cyber Threat Intelligence (CTI) capability, ensuring intelligence is actionable, relevant and embedded within SOC operations. Collaborate closely with Detection Engineering and CTI teams to transform intelligence insights into meaningful threat hunting hypotheses and use cases. Design and lead advanced threat hunting exercises , leveraging More ❯
A global IT MSP is looking for an experienced SOC Incident Response & Threat Hunting Manager to join its expanding SecurityOperations Centre. This is a pivotal leadership role, overseeing Tier 3 Security and Incident Response Analysts while driving proactive threat hunting and cyber threat intelligence initiatives. This hands-on position combines technical depth, strategic leadership, and a … 6k Vehicle allowance Excellent skill up and career progression Flexible working from Day 1 Plus more Skills & Experience Proven experience leading incident response and threat hunting teams within a SOC or similar environment. Deep technical expertise in Digital Forensics and Incident Response (DFIR), with strong analytical and problem-solving skills. Skilled at translating complex technical findings into clear, actionable More ❯
Central London, London, United Kingdom Hybrid/Remote Options
Colt Technology Services
Company description: As the Lead - SOC Incident Manager, your role will encompass communicating cybersecurity incidents to key partners across the enterprise as well as being the main interface between the Colt business units and the cybersecurity groups. You will be the subject matter expert responsible for coordinating cyber security incidents across the enterprise. Job description: You will … play a key role within the SOC to manage incidents: Coordinate response efforts to cyber security incidents caused by internal and external threats to reduce the impact of these incidents to Colt and its customers. Act as the bridge between the SOC incident responders, IT support teams and business groups to ensure a consistently execution of incident triage More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Colt Technology Services
hubs. With a global reach but a deep local presence, Colt is big enough to deliver and small enough to care. Why we need this role? As the Lead - SOC Incident Manager, your role will encompass communicating cybersecurity incidents to key partners across the enterprise as well as being the main interface between the Colt business units … groups. You will be the subject matter expert responsible for coordinating cyber security incidents across the enterprise. What you will do: You will play a key role within the SOC to manage incidents: Lead and coordinate response efforts to cyber security incidents caused by internal and external threats to reduce the impact of these incidents to Colt and its … customers. Act as the bridge between the SOC incident responders, IT support teams and business groups to ensure a consistently execution of incident triage and remediation. Build and manage cyber incident tabletop exercises to ensure Colt is prepared to deal with cybersecurity incidents. Perform post incident analysis, identifying lessons learned throughout Fidelity with applicable teams for tactical and strategic More ❯
hubs. With a global reach but a deep local presence, Colt is big enough to deliver and small enough to care. Why we need this role? As the Lead - SOC Incident Manager, your role will encompass communicating cybersecurity incidents to key partners across the enterprise as well as being the main interface between the Colt business units … groups. You will be the subject matter expert responsible for coordinating cyber security incidents across the enterprise. What you will do: You will play a key role within the SOC to manage incidents: Lead and coordinate response efforts to cyber security incidents caused by internal and external threats to reduce the impact of these incidents to Colt and its … customers. Act as the bridge between the SOC incident responders, IT support teams and business groups to ensure a consistently execution of incident triage and remediation. Build and manage cyber incident tabletop exercises to ensure Colt is prepared to deal with cybersecurity incidents. Perform post incident analysis, identifying lessons learned throughout Fidelity with applicable teams for tactical and strategic More ❯
Company description: As the Lead - SOC Incident Manager, your role will encompass communicating cybersecurity incidents to key partners across the enterprise as well as being the main interface between the Colt business units and the cybersecurity groups. You will be the subject matter expert responsible for coordinating cyber security incidents across the enterprise click apply for full More ❯
Job Title: SOC Incident Response & Threat Hunting Manager Location: Warrington, UK (Travel may be required) Flexible Working: "Work Your Way" available from day one Im working with a gold-standard IT Managed Service Provider renowned for delivering secure, enterprise-grade solutions across cloud, infrastructure, and cyber domains. Theyre expanding their SecurityOperationsCentre and hiring a hands … on SOC Incident Response & Threat Hunting Manager to lead Tier 3 analysts and drive proactive defence strategies. This is a strategic and technical leadership role, ideal for someone with deep DFIR expertise, strong mentoring capabilities, and a passion for threat hunting and CTI development. Key Responsibilities: Lead and coordinate high-severity incident response engagements Provide technical oversight … on threat hunting operations Translate threat intelligence into actionable hypotheses and use cases Design and execute advanced threat hunting exercises across varied environments Develop in-house training programmes for SOC analysts Drive CTI maturity and visibility across internal and customer-facing functions Ensure comprehensive documentation and stakeholder reporting Participate in the on-call rotation for critical incidents Skills & Experience More ❯
We are seeking a highly skilled and experienced SOC Incident Response & Threat Hunting Manager to join our growing SecurityOperations Centre. This pivotal role will be responsible for leading our Tier 3 Security and Incident Response Analysts, overseeing advanced incident response activities, driving proactive threat hunting initiatives, and providing strategic direction for the Cyber Threat Intelligence (CTI … Integrate threat intelligence into hunting activities to maintain a proactive defence posture informed by current and emerging threats. Develop and deliver high-quality in-house training programmes for the SOC team, including tabletop exercises, forensic challenges, and upskilling sessions on new tools and techniques. Participate in the on-call rotation to support critical incidents. Your transferable skills and experience More ❯