We are partnered with a leading global consultancy that is searching for a contractor with the following skillset to work on a 6 months contract.If you are interested and have the relevant experience, please apply promptly and we will contact you to discuss it further.
Job Title: SOC Lead
Location: Hybrid (3 days in office)
About the Role
We are seeking a highly skilled SOC Lead to oversee cyber incident response, threat intelligence, and vulnerability management for a leading organization. This role will act as a trusted advisor to senior leadership, ensuring a structured and effective response to cyber incidents while driving improvements in incident management processes.
Key Responsibilities
- Lead and coordinate responses to significant cyber incidents, ensuring effective and timely resolution.
- Act as a subject matter expert, advising senior leadership on business impacts and risk mitigation strategies.
- Develop and implement cyber incident containment plans and remediation strategies.
- Oversee incident investigations, reporting, and documentation to drive continuous improvement.
- Collaborate with Threat Intelligence and Incident Response teams to monitor and respond to emerging threats.
- Ensure effective vulnerability management, prioritizing risks and coordinating remediation efforts.
- Provide regular technical and management reports demonstrating the effectiveness of security operations.
- Develop and maintain incident response playbooks, templates, and exercises.
- Translate complex technical incidents into business-focused reports for key stakeholders.
- Support business continuity and crisis management efforts.
Key Skills & Experience
- Extensive experience in managing and responding to cyber incidents.
- Strong leadership, crisis management, and decision-making skills.
- Excellent communication and stakeholder management abilities.
- Deep understanding of adversarial attack techniques and security threats.
- Experience with SIEM architecture, XDR, and incident response tooling.
- Strong knowledge of vulnerability management processes and tools.
- Proficiency in threat intelligence analysis and its integration into response strategies.
- Ability to manage multiple high-priority incidents in a fast-paced environment.
- Certifications such as CGIH, CISM, GCIH, or GCFA are highly desirable.