Engineer the Quantum RevolutionYour expertise can help us shape the future of quantum computing at Oxford Ionics.

View Open Roles

Security Operations Managers x2

Morson Talent
London
4 days ago
Create job alert

Security Operations Managers
Remote with occasional travel to Crawley
£850 per day - Outside IR35
6-9 month duration
Summary
A UK Critical National Infrastructure (CNI) energy operator is appointing two contract Security Operations Managers who will work in lock-step: a Run Lead to steer and mature the live CSIRT Response Function, and a Build Lead to create new, minimum-viable capabilities and hand them into service. Both posts sit under the Cyber Security Response Manager and are driven by the NCSC Cyber Assessment Framework (CAF) and NIST SP 800-61 r3 guidance for incident response. The culture is "good-enough-today, better-tomorrow": short, bullet-point artefacts, daily measurable progress, and rapid decision-making.
________________________________________
Background & Purpose
Digital transformation and heightened threat activity place the UK energy sector under sustained pressure to detect and respond quickly. While the existing SOC provides baseline monitoring, it needs stronger governance, clearly defined processes, and fresh capabilities delivered at pace. Close partnership with the Managed Security Services Provider (MSSP) is essential to uplift the service and assure resilience.
________________________________________
Shared Responsibilities

  • Operate to recognised frameworks - align policies, processes and runbooks to the NCSC CAF objectives for CNI resilience and the incident-handling lifecycle in NIST SP 800-61 r3, keeping documentation concise and auditable.
  • Embed pragmatic process - create bullet-point playbooks, runbooks and knowledge-base pages that teams can follow under pressure.
  • Build out a predefined KPI set - track a lean group of SOC metrics (e.g., false-positive rate, improvement tickets closed, SLA breaches) and review them daily with analysts and weekly with the Cyber Security Response Manager.
  • Lead people & partners - recruit and mentor seven senior analysts, motivate existing staff, and hold the MSSP to clear responsibilities.
  • Promote continuous learning - capture lessons learned after every incident and incorporate them into updated runbooks and training sessions.
    ________________________________________
    Run Lead - Key Outcomes
  • Day-to-day command of CSIRT / Response operations - own the shift rota, alert triage, escalation and service-improvement backlog.
  • Governance starter-pack - stand-up daily stand-ups, a Kanban board and a lightweight RACI so everyone knows who does what.
  • Targeted blue-team exercises - schedule and run periodic blue-team (or red-vs-blue) simulations to prove that services and processes work as intended record findings and fold improvements into revised runbooks.
  • Service-readiness assurance - rehearse incident scenarios, validate hand-offs with the MSSP, and confirm evidence is logged for audit.
  • Analyst development & morale - onboard seven senior analysts, set daily objectives, and champion a supportive, high-energy culture.
    ________________________________________
    Build Lead - Key Outcomes
  • Backlog of minimum-viable capabilities - identify, prioritise and deliver quick-win defined capabilities (processes, procedures, runbooks and supporting metrics) that can be demonstrated within days and transitioned to Run.
  • Structured hand-off - for every new capability, supply concise documentation, decision logs and acceptance criteria so Run can adopt it immediately.
  • Process integration - embed new workflows into existing tooling and MSSP playbooks without disrupting live operations.
  • Evidence of value - report weekly on capabilities delivered, KPIs affected and lessons learned, using the predefined KPI set.
    ________________________________________
    Candidate Profile
  • Proven rapid delivery - has led at least five SOC builds or rapid rebuilds from zero to operational within six-to-twelve months, ideally in regulated or high-availability sectors.
  • Framework fluent - comfortable applying NCSC CAF principles and NIST SP 800-61 r3 incident-handling guidance pragmatically, avoiding bureaucracy.
  • Hands-on leadership - coaches senior analysts, removes blockers in real time, and can work directly in SIEM, SOAR, EDR and cloud telemetry tools.
  • Action-oriented communicator - prefers calls and stand-ups over long email threads decisive yet collaborative.
  • Continuous-improvement mindset - captures every lesson and turns it into updated runbooks, training or process tweaks.

    TPBN1_UKTJ

Related Jobs

View all jobs

Security Operations Manager (EMEA)

Technical Service Delivery Manager

Security Manager - Logistics

Senior Cloud Security Engineer

Senior Cloud Security Engineer

SOC SIEM Engineer

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

The Future of Cybersecurity Jobs: Careers That Don’t Exist Yet

Cybersecurity has moved from a specialist concern to a national and global priority. Once seen as an IT issue, it is now a boardroom subject, a government responsibility, and a daily reality for individuals. With the increasing reliance on digital infrastructure, cloud platforms, and artificial intelligence, the risks posed by cyber threats have never been higher. The UK’s cybersecurity sector is thriving. It is home to thousands of companies offering defence services, penetration testing, encryption solutions, and critical infrastructure protection. Demand for cybersecurity skills continues to rise, with both the public and private sector investing heavily to defend against ransomware, nation-state cyber operations, and new forms of digital crime. Yet the industry is still at the beginning of its journey. The technologies that will define the next two decades—artificial intelligence, quantum computing, extended reality, and the Internet of Things—are only just starting to reshape cybersecurity. This means that many of the most important cybersecurity jobs of the future don’t even exist today. This article explores why new roles will emerge, what they might look like, how today’s jobs will evolve, why the UK is well-positioned to lead, and how professionals can prepare.

Seasonal Hiring Peaks for Cybersecurity Jobs: The Best Months to Apply & Why

The UK's cybersecurity sector has emerged as one of the most critical and lucrative technology markets, with roles spanning from security analysts to penetration testers and chief information security officers. With cybersecurity positions commanding salaries from £28,000 for junior security analysts to £140,000+ for senior security architects, understanding when organisations actively recruit can dramatically impact your career trajectory in this essential field. Unlike traditional IT sectors, cybersecurity hiring follows distinct patterns influenced by threat landscapes, regulatory compliance cycles, and incident response requirements. The sector's unique combination of perpetual threat evolution, regulatory pressures, and skills shortages creates predictable hiring windows that strategic professionals can leverage to advance their careers in protecting Britain's digital infrastructure. This comprehensive guide explores the optimal timing for cybersecurity job applications in the UK, examining how cyber threat cycles, compliance deadlines, and government initiatives influence recruitment patterns, and why strategic timing can determine whether you join a cutting-edge security consultancy or miss the opportunity to defend against tomorrow's cyber threats.

Pre-Employment Checks for Cyber Security Jobs: DBS, References & Right-to-Work and more Explained

The cyber security sector in the UK stands at the forefront of protecting national infrastructure, business operations, and personal data from increasingly sophisticated cyber threats. As organisations across all sectors recognise cyber security as a critical business function, employers are implementing the most rigorous pre-employment screening processes in the technology industry to ensure they recruit professionals capable of defending against advanced persistent threats and maintaining the highest standards of security and trustworthiness. Whether you're a penetration tester, security analyst, incident response specialist, or chief information security officer, understanding the comprehensive vetting requirements is essential for successfully advancing your career in this security-critical field. This detailed guide explores the extensive background checks and screening processes you'll encounter when applying for cyber security positions in the UK, from fundamental eligibility verification to the most stringent security clearance requirements and specialised threat intelligence assessments.