Senior Security Operations Center (SOC) Manager

cyberproai • Israel
Relocation
Apply
AI Summary

Lead SOC operations, drive cybersecurity strategy, and manage a team of SOC analysts. Develop and implement policies, processes, and playbooks to improve security effectiveness. Stay updated on emerging threats and security technologies.

Key Highlights
Lead SOC operations and drive cybersecurity strategy
Manage a team of SOC analysts and incident responders
Develop and implement policies, processes, and playbooks
Stay updated on emerging threats and security technologies
Technical Skills Required
SIEM platforms (QRadar) Threat detection methodologies Scripting (Python, PowerShell, Bash) Cloud security (AWS, Azure, GCP) Network defense strategies MITRE ATT&CK NIST CIS
Benefits & Perks
Relocation role
Relocation package

Job Description


We are seeking an experienced SOC Manager to lead our Security Operations Center (SOC) and drive our cybersecurity strategy forward. The ideal candidate will have a deep understanding of SIEM platforms, threat detection, and incident response, with a proven track record in managing SOC teams and enhancing security operations.

This is a relocation role.


Key Responsibilities:


SOC Leadership & Operations:

  • Oversee day-to-day SOC operations, ensuring timely threat detection, incident response, and threat mitigation.
  • Develop and implement SOC policies, processes, and playbooks to improve security effectiveness.
  • Lead proactive threat-hunting and forensic analysis to strengthen the organization's security posture.
  • Continuously evaluate and enhance SIEM configurations, alerting mechanisms, and automation.


Team Management & Training:

  • Recruit, mentor, and manage a team of SOC analysts and incident responders.
  • Provide technical guidance and ensure continuous skill development through training and knowledge-sharing initiatives.
  • Establish a SOC training framework to keep the team updated on new threats, tools, and industry best practices.


Incident Response & Threat Intelligence:

  • Lead incident investigation, containment, and remediation efforts, coordinating with internal teams and external partners.
  • Oversee threat intelligence gathering and integration into SOC operations.
  • Align security operations with MITRE ATT&CK, NIST, and other cybersecurity frameworks.


Technology & Innovation:

  • Optimize SIEM, EDR, IDS/IPS, firewalls, and other security tools to improve detection and response capabilities.
  • Identify and implement automation and orchestration solutions to increase SOC efficiency.
  • Stay updated on emerging threats, attack techniques, and security technologies to drive continuous improvements.


Required Qualifications:

  • 5+ years of experience in SOC leadership, cybersecurity operations, or incident response
  • Strong hands-on experience with SIEM platforms (QRadar preferred) and threat detection methodologies
  • Expertise in incident response, threat hunting, and forensic analysis
  • Knowledge of cloud security (AWS, Azure, GCP) and network defense strategies
  • Proficiency in scripting (Python, PowerShell, or Bash) for security automation
  • Familiarity with MITRE ATT&CK, NIST, CIS, and other security frameworks
  • Excellent communication and leadership skills with a track record of team development and cross-functional collaboration


Preferred Qualifications:

  • Security certifications such as CISSP, GCIH, GCFA, OSCP, or SIEM-specific certifications
  • Experience leading SOC optimization projects and implementing SOAR solutions
  • Background in offensive security (Red Team/Purple Team) is a plus

If you're a proactive SOC leader ready to take on a challenging and rewarding role, apply now!


Subscribe our newsletter

New Things Will Always Update Regularly