Job Search and Career Advice Platform

Enable job alerts via email!

Tech Lead - SOC Responder

THG

Manchester

Hybrid

GBP 60,000 - 80,000

Full time

2 days ago
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A security operations company is seeking an experienced professional to support the SOC Manager in overseeing security operations. You will lead the management of SIEM tools, handle incident responses, and ensure the security of infrastructure. The ideal candidate should have over 6 years of experience in Information Security Incident Response, a strong understanding of networking, and proficiency in scripting. The position offers flexible working hours and opportunities for development.

Benefits

Flexible working hours
Extensive induction program
Global family leave policy
Employee assistance program

Qualifications

  • 6+ years Information Security Incident Response experience.
  • Strong understanding of the threat landscape surrounding enterprise systems.
  • Deep understanding of endpoint and network security protocols.

Responsibilities

  • Support SOC Manager in delivering security operations services.
  • Lead SIEM and incident response tasks.
  • Establish security incident response processes and investigations.

Skills

Information Security Incident Response
Networking and systems experience
Scripting (Python, PowerShell, Unix shell)
Cyber security operations
Communication skills

Education

Degree in Information Technology or a related field

Tools

SIEM tools (e.g., ArcSight, Microsoft Sentinel, LogRhythm)
Job description
About the Role

Support the SOC Manager in delivering a wide range of security operations services at Colt Technology Services. Lead SIEM, incident response, and infrastructure security tasks, ensuring tools and processes are robust and effective.

Responsibilities
  • SIEM, IR tools platform management including design, implementation, administration, use case preparation, connector deployment, maintenance & health checks.
  • Responsible for operational activities, technology escalation support, security solution assessment, build activities, and maturing existing services.
  • Analyse potential infrastructure security incidents to determine if an incident qualifies as a legitimate breach.
  • Establish and govern the security incident response processes, investigations, and operational processes.
  • Maintain and enhance the formal service catalogue, service descriptions, targets and performance metrics.
  • Ensure security services, tools and platforms are adequately maintained.
  • Monitor and report on the effectiveness of security‑enforcing technologies.
  • Identify and continuously monitor specific security risks and KPIs, producing management information that demonstrates value of key security investments.
  • Contribute to the design, development and maintenance of security standards and controls.
  • Align the team's goals and plans with Colt’s long‑term priorities and strategy.
  • Develop and grow talent and people capability within the security teams.
Qualifications & Experience
  • 6+ years Information Security Incident Response experience, focused on detection and response to malicious activity using log data from various sources.
  • Strong networking and systems experience, preferably in an enterprise environment.
  • Strong understanding of information security and the threat landscape surrounding enterprise systems.
  • Strong scripting experience (Python, PowerShell, Unix shell).
  • Demonstrated experience working in all phases of the SDLC.
  • Deep understanding and experience using cyber security operations, security monitoring, endpoint (EDR), network, and SIEM tools.
  • Prior SOC experience is a plus.
  • Extensive knowledge of network and server security protocols, technologies, and products.
  • Industry‑recognized certifications (e.g., CISSP, GCIH, GCFA, OSCP) preferred.
  • Strong oral and written communication skills.
  • Relentless curiosity and attention to detail.
  • Ability to learn quickly and leverage prior experience to effectively solve current security challenges.
  • Refusal to accept the status quo.
  • Degree in Information Technology, Engineering or a related field.
  • SIEM management experience – desirable to hold an advanced vendor certification for products such as ArcSight, Microsoft Sentinel or LogRhythm.
Benefits
  • Flexible working hours and the option to work from home.
  • Extensive induction program with experienced mentors and buddies.
  • Opportunities for further development and educational opportunities.
  • Global family leave policy.
  • Employee assistance program.
  • Internal inclusion & diversity employee networks.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.