Role Overview
The
SOC Manager
assesses detection workflows, response processes, playbooks, and overall operational readiness. This role focuses on evaluating incident timelines, triage quality, escalation logic, and consistency across SOC operations.
What You’ll Do
Review detection alerts, triage workflows, and escalation pathways
Evaluate completeness, accuracy, and quality of incident response actions
Identify gaps in logging, detection coverage, and containment logic
Summarize incident patterns, operational bottlenecks, and systemic weaknesses
Validate playbooks for clarity, correctness, and real-world feasibility
Support recurring assessments of SOC maturity, responsiveness, and operational rigor
What You Bring
Must-Have :
Experience in SOC operations, incident response leadership, or cybersecurity operations
Strong understanding of detection engineering, response workflows, and incident lifecycle management
Clear analytical writing and structured documentation skills
Nice-to-Have :
Familiarity with SIEM platforms, EDR tools, and cloud-native detection systems
$40 - $60 an hour
#J-18808-Ljbffr
Manager • San Francisco, California, United States