We are partnered with a leading global consultancy that is searching for a contractor with the following skillset to work on a 6 months contract. If you are interested and have the relevant experience, please apply promptly and we will contact you to discuss it further.
Job Title: SOC Lead
Location: Hybrid (3 days in office)
About the Role
We are seeking a highly skilled SOC Lead to oversee cyber incident response, threat intelligence, and vulnerability management for a leading organization. This role will act as a trusted advisor to senior leadership, ensuring a structured and effective response to cyber incidents while driving improvements in incident management processes.
Key Responsibilities
* Lead and coordinate responses to significant cyber incidents, ensuring effective and timely resolution.
* Act as a subject matter expert, advising senior leadership on business impacts and risk mitigation strategies.
* Develop and implement cyber incident containment plans and remediation strategies.
* Oversee incident investigations, reporting, and documentation to drive continuous improvement.
* Collaborate with Threat Intelligence and Incident Response teams to monitor and respond to emerging threats.
* Ensure effective vulnerability management, prioritizing risks and coordinating remediation efforts.
* Provide regular technical and management reports demonstrating the effectiveness of security operations.
* Develop and maintain incident response playbooks, templates, and exercises.
* Translate complex technical incidents into business-focused reports for key stakeholders.
* Support business continuity and crisis management efforts.
Key Skills & Experience
* Extensive experience in managing and responding to cyber incidents.
* Strong leadership, crisis management, and decision-making skills.
* Excellent communication and stakeholder management abilities.
* Deep understanding of adversarial attack techniques and security threats.
* Experience with SIEM architecture, XDR, and incident response tooling.
* Strong knowledge of vulnerability management processes and tools.
* Proficiency in threat intelligence analysis and its integration into response strategies.
* Ability to manage multiple high-priority incidents in a fast-paced environment.
* Certifications such as CGIH, CISM, GCIH, or GCFA are highly desirable