SOC SME

London
3 weeks ago
Create job alert

Job Title

Lead SOC Subject Matter Expert (Future-State Security Operations)

Position Overview

We are seeking a Lead Security Operations Centre (SOC) Subject Matter Expert to spearhead the transformation of Security Operations from a traditional, reactive defence model into an AI-enabled, human-driven SecOps capability.

In this role, you will lead the shift away from manual alert triage toward security platform optimisation, proactive threat anticipation, and autonomous defensive controls. You will shape both the technology strategy and the operating model, ensuring humans remain firmly in control while leveraging AI at scale.

Key Responsibilities

Strategic Platform & Automation Leadership

Lead and support the selection, design, and transition from fragmented security tooling to a unified SIEM platform and security data lake.
Drive a fundamental shift from incident-focused, task-based workflows to preventative security activities and platform optimisation.
Proactive Threat Focus

Guide the evolution from reactive alert handling to proactive threat hunting and investigation.
Leverage AI and advanced analytics across diverse data sets to uncover hidden patterns and anomalies before exploitation occurs.
Attack Path Modelling & Autonomous Hardening

Support the specification, design, and implementation of an attacker-centric defence strategy.
Use AI and threat intelligence to visualise lateral movement paths and chokepoints.
Oversee autonomous hardening capabilities that automatically patch systems and update configurations based on predicted attack paths.
AI Safety & Governance

Assist in defining and deploying controls to manage enterprise AI risks, including prompt injection, data poisoning, and model theft.
Deploy and monitor “guardian agents” to provide real-time detection of malicious behaviour within AI systems.
Incident Response & Resilience

Guide the development, testing, and maintenance of advanced incident response plans, with a focus on high-impact threats such as human-operated ransomware.
Ensure rapid isolation of affected assets and credential revocation to minimise blast radius.
Identity & Cloud Security

Enforce phishing-resistant MFA and oversee the security of workload identities (applications, services, scripts).
Address the growing threat of cloud identity abuse by sophisticated adversaries.
Cross-Functional Alignment

Partner with IT operations and business leaders to ensure security evolution aligns with business objectives and board-level risk management.

Required Skills & Qualifications

Advanced Threat Intelligence Expertise
Deep knowledge of modern attacker TTPs, including nation-state actors, infostealers, and cloud identity abuse.
Proven SOC Transformation Delivery
Demonstrated leadership of SOC operations with at least five successful SOC builds or rapid rebuilds, delivered from inception to live operation within 6–12 months, ideally in regulated or high-availability environments.
End-to-End Programme Ownership
Full lifecycle ownership of major initiatives including MDR consolidation, SIEM, SOAR, and security data lake deployments, delivering measurable business outcomes.
Formal RFP & Vendor Management Expertise
Proven experience authoring RFPs, evaluating vendors, and overseeing complex onboarding and integration.
Battle-Tested Incident Response
Hands-on expertise in detection, response, and automation — with a clear understanding of what succeeds (and fails) under real-world pressure.
Vendor-Neutral Technical Leadership
Ability to navigate and apply leading MDR, SIEM, SOAR, and data lake technologies agnostically to the problem being solved.
AI & Automation Proficiency
Practical experience implementing agentic assistance and managing semi-autonomous security systems.
Security Architecture Mindset
Strong commitment to Zero Trust principles and an assume-breach philosophy.
Executive-Level Communication
Ability to translate complex technical risk into business-focused metrics (e.g. response times, patch latency) for the C-suite and Board.
Mentorship & Team Evolution
Proven ability to upskill teams, fostering a culture where humans provide critical oversight and quality control over automated processes.
Analytical Rigor
Expertise in behaviour-based analytics and the use of AI to synthesise 100 trillion+ security signals into actionable intelligence.

The Future of the Role

As Lead SOC SME, you recognise that the most successful security teams are not those that automate the most, but those that empower analysts most effectively. Your goal is to build a future-state SOC where AI accelerates insight and response, while skilled practitioners retain ownership, judgement, and strategic control

Related Jobs

View all jobs

Senior Microsoft Security Specialist

Third Party Risk Lead Cyber

SOC Shift Leader

SOC Analyst

SOC Subject Matter Expert / Product Manager

SOC Engineer

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.