- Company Name
- Evantis Recruitment
- Job Title
- SOC Manager
- Job Description
-
Job Title: SOC Manager
Role Summary:
Oversee and optimize a fully integrated Security Operations Center (SOC) for a global organization. Lead a multidisciplinary team, maintain continuous SOC readiness, and ensure alignment with industry frameworks and compliance mandates. Drive incident response excellence, improve detection precision, and enhance stakeholder confidence through data‑driven insights.
Expactations:
- Maintain SOC uptime and comply with SLAs.
- Monitor and improve KPIs: MTTD, MTTR, false‑positive rate, alert fatigue, SOC maturity.
- Deliver accurate incident investigations and technical escalation strategies.
- Foster strong collaboration between on‑site and offshore teams.
- Ensure successful security audits and positive client satisfaction scores.
Key Responsibilities:
- Lead the SOC team, setting direction and culture for operations.
- Define, implement, and refine SOC operating models, Incident Response playbooks, and incident management workflows aligned with NIST 800‑61, SANS IR, MITRE ATT&CK, NIST CSF, ISO 27001.
- Oversee security monitoring across SIEM, SOAR, EDR/XDR, and cloud detection platforms (LogRhythm, Splunk, Sentinel, Securonix, XSIAM, CrowdStrike Falcon, Microsoft Defender, SentinelOne).
- Conduct root‑cause analysis and post‑mortem reviews; translate findings into actionable business insights.
- Manage alert triage, escalation procedures, and incident containment strategies.
- Maintain and tune automation scripts in SOAR environments (Splunk SOAR, XSOAR, Securonix SOAR).
- Execute threat‑intel integration and network forensics investigations.
- Ensure compliance with PCI‑DSS, GDPR, SOX, and other regulatory mandates.
- Coordinate with external partners, managed security service providers, and auditors.
- Report on SOC performance and readiness to senior security leadership.
Required Skills:
- Proven leadership and managerial experience in SOC environments.
- Deep expertise in SIEM, SOAR, EDR/XDR, and cloud security detection/response.
- Strong knowledge of incident response frameworks, threat intelligence, UEBA, DLP, and threat hunting.
- Experience with global teams and MSSP/managed SOC contexts.
- Excellent communication, stakeholder management, and customer engagement skills.
- Analytical mindset with ability to translate technical incidents into business‑relevant insights.
Required Education & Certifications:
- Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or Information Security.
- Certifications: CISSP, CISM, GIAC (GCIH, GCIA, GCFA, GCTI, GMON), CEH, CompTIA CySA+, LogRhythm Analyst/Administrator, Azure Security (AZ‑500 / SC‑200).