SOC Lead

Salary/Rate:£75,000
Job type:Permanent
Town/City:Remote
County/State/Region:Remote
Job ref:952870
Post Date:10.09.24
Scroll

About the Role

Are you looking for a lead role focused on helping customers close out incidents and improving SOC operations? Trident Search are working with a long standing client who are looking for a lead to do just that.
 
This opening is essential for managing major cyber incidents and ensuring the SOC team provides high-quality analysis and investigations for customers. This role focuses on developing the team's skills and encouraging continuous improvement through automation and optimization. This role requires someone who is able to obtain SC Clearance and monthly travel to our clients office along the M4 corridor is essential.
 
Role Responsibilities:
 
  • Enhance the quality of detection mechanisms, response routines, and playbooks.
  • Improve the threat intelligence platform and optimize threat indicators and data.
  • Provide comprehensive cybersecurity expertise to the SOC, including advising, mentoring, and coaching.
  • Collaborate across the organization to reduce alert volume and enhance SOC efficiency, including training SOC staff on investigations and rule tuning.
  • Ensure the SOC meets SLAs and delivers high-quality alerts, tickets, and incident responses.
  • Lead and train the SOC in threat hunting to improve detection capabilities.
  • Guide the SOC in producing actionable threat briefs for significant cyber events.
  • Share knowledge proactively within the team and the broader company through training and mentoring sessions.
  • Serve as the escalation point for technical analysis within the SOC.
  • Act as the Incident Management Lead for the SOC.
  • Conduct incident exercises and support forensic investigations and Incident Response (IR) companies.
 
Essential Qualities:
 
  • Experience in a cybersecurity-focused role, preferably within a SOC or in Incident Response.
  • Extensive experience with log monitoring tools and SIEM platforms such as Splunk or Microsoft Sentinel.
  • Strong capability in training, coaching, and mentoring technical teams.
  • Advanced cybersecurity knowledge and awareness of recent trends.
  • Familiarity with host and network-based forensics.
  • Experience in vulnerability management processes.
  • Skill in endpoint artifact analysis.
  • Experience with cloud hosting platforms such as Microsoft Azure, AWS, or Google Cloud Workspace.
 
If you are looking for a technical hands on position, within a growing SOC team go ahead and apply now.

More jobs from this recruiter

View All

L3 Security Analyst

London
London
£55,000-£75,000
L3 Analyst

SOC Lead

Remote
Remote
£75,000
Tech lead