- Company Name
- LRQA
- Job Title
- Security Operations Manager
- Job Description
-
**Job Title:** Security Operations Manager
**Role Summary:**
Leads and advances corporate cyber‑defence capabilities, overseeing internal Security Operations analysts and a 24×7 outsourced SOC/Incident Response (IR) provider. Combines threat‑informed detection engineering, AI‑enhanced investigation, vulnerability management, and incident coordination to protect endpoints, identities, cloud, and network environments.
**Expectations:**
- Implement an AI‑first approach to increase detection fidelity and reduce alert noise.
- Deliver fast, predictable, high‑quality incident triage and response.
- Build a skilled internal analyst team supported by effective third‑party SOC performance.
- Reduce security exposures through proactive vulnerability analysis and prioritized remediation.
**Key Responsibilities:**
- Design, mature, and scale detection & response capabilities across endpoint, identity, cloud, and network layers.
- Own alert logic, playbooks, escalation workflows, and post‑incident reviews.
- Lead major incident response, coordinating internal teams and third‑party IR resources.
- Manage, mentor, and develop internal Cyber Security Analysts; drive AI‑assisted investigation techniques.
- Oversee 24×7 outsourced SOC/IR provider: define SLAs/KPIs, enforce escalation procedures, conduct service reviews.
- Drive adoption and integration of AI‑enabled security tools, ensuring explainable and accurate outputs.
- Own vulnerability management program: identify, prioritize, track, and remediate weaknesses; integrate vulnerability intelligence into detection engineering.
- Define and report operational metrics (MTTD, MTTR, alert fidelity, incident trends) to senior leadership.
- Collaborate with IT, Cloud, Engineering, and Risk teams; support compliance, audit, and regulatory inquiries.
**Required Skills:**
- Proven experience leading Security Operations, SOC, or incident response teams.
- Deep knowledge of detection engineering, incident response lifecycle, and modern monitoring technologies (SIEM, EDR/XDR, SOAR).
- Strong track record managing third‑party SOC and IR service providers, including SLA/KPI governance.
- Familiarity with AI‑assisted security tools and ability to embed AI outputs into workflows.
- Expertise in vulnerability management, risk‑based prioritization, and reporting.
- Ability to map detection logic to frameworks such as MITRE ATT&CK.
- Excellent leadership, communication, vendor management, and cross‑functional collaboration skills.
- Experience in hybrid or cloud‑first environments (preferred).
**Required Education & Certifications:**
- Not specified in the posting; typically a bachelor’s degree in Computer Science, Information Security, or related field is expected.
- Relevant security certifications (e.g., CISSP, CISM, GSEC, CISA) are advantageous but not mandated.
Birmingham, United kingdom
On site
04-02-2026