Job Title: SOC Incident Response & Threat Hunting Manager Location: Remote Salary: 75k - 85k plus 10% bonus and 6k car allowance Mon Fri as well as an on-call rota - 1 week in 4. Candidates must be willing and eligible to go through SC security clearance for this role Job Description: We are seeking a highly skilled and experienced SOC … Incident Response & Threat Hunting Manager to join our growing Security Operations Centre. This pivotal role will be responsible for leading our Tier 3 Security and Incident Response Analysts, overseeing advanced incident response activities, driving proactive threat hunting initiatives, and providing strategic direction for the Cyber ThreatIntelligence (CTI) capability. This is a hands-on leadership position … incident response (DFIR), and a proactive mindset to anticipate and neutralise sophisticated and evolving cyber threats. Key Responsibilities: Provide expert guidance and technical oversight on complex security incidents and threat hunting operations. Lead and coordinate high-severity incident response engagements, acting as the primary incident lead when required. This includes managing cross-functional teams, communications, and critical decision-making More ❯
This role is hands on and technical. This company delivers advanced Cyber services across critical sectors supporting clients through offerings such as 24/7 SOC operations, Security Assurance, ThreatIntelligence, Third-Party Risk, and Crisis Simulations . About the Role Youll play a key role in delivering and optimising cybersecurity solutions across a diverse client base. Youll … on hybrid and multi-cloud security best practices Qualifications & Experience Certifications such as Cisco CCNA/CCNP , Fortinet NSE , or CompTIA Security+ (advantageous) Demonstrable experience delivering Cyber services in: Threat & Vulnerability Management Penetration Testing/Offensive Security SOC/MDR operations Third-Party Risk or Compliance (ISO, NIST, GDPR) Additional Information Must have the right to live and work More ❯
design, execution, and reporting, with a focus on realism and impact Creating or modifying tools, exploits, and payloads as needed not relying solely on off-the-shelf frameworks Supporting threat-led testing programs and integrating threatintelligence into operations Maintaining strict operational security and professional discipline in all activities What were looking for: 34+ years of true More ❯
offensive security Proficiency with C2 frameworks (Cobalt Strike, Sliver, Mythic) Deep understanding of Windows/Linux internals, AD, and cloud (AWS/Azure) Knowledge of OPSEC, evasive TTPs, and threatintelligence integration Strong scripting skills (Python, PowerShell, Bash) OSCP, CRTO, OSCE, or similar certs Published exploits or open-source tools Why BreachLock: 100% remote-first culture Cutting-edge More ❯
and are looking for support with design and delivery. The company supports a diverse client base across critical sectors, offering multiple services including: 24/7 SOC, Security Assurance, ThreatIntelligence, 3rd Party Risk, and Crisis Sims. The work here is potentially repetitive, however it does offer the opportunity to create meaningful Cyber Security content, and interface directly More ❯