SOC SME

London
2 days ago
Create job alert

Job Title

Lead SOC Subject Matter Expert (Future-State Security Operations)

Position Overview

We are seeking a Lead Security Operations Centre (SOC) Subject Matter Expert to spearhead the transformation of Security Operations from a traditional, reactive defence model into an AI-enabled, human-driven SecOps capability.

In this role, you will lead the shift away from manual alert triage toward security platform optimisation, proactive threat anticipation, and autonomous defensive controls. You will shape both the technology strategy and the operating model, ensuring humans remain firmly in control while leveraging AI at scale.

Key Responsibilities

Strategic Platform & Automation Leadership

Lead and support the selection, design, and transition from fragmented security tooling to a unified SIEM platform and security data lake.
Drive a fundamental shift from incident-focused, task-based workflows to preventative security activities and platform optimisation.
Proactive Threat Focus

Guide the evolution from reactive alert handling to proactive threat hunting and investigation.
Leverage AI and advanced analytics across diverse data sets to uncover hidden patterns and anomalies before exploitation occurs.
Attack Path Modelling & Autonomous Hardening

Support the specification, design, and implementation of an attacker-centric defence strategy.
Use AI and threat intelligence to visualise lateral movement paths and chokepoints.
Oversee autonomous hardening capabilities that automatically patch systems and update configurations based on predicted attack paths.
AI Safety & Governance

Assist in defining and deploying controls to manage enterprise AI risks, including prompt injection, data poisoning, and model theft.
Deploy and monitor “guardian agents” to provide real-time detection of malicious behaviour within AI systems.
Incident Response & Resilience

Guide the development, testing, and maintenance of advanced incident response plans, with a focus on high-impact threats such as human-operated ransomware.
Ensure rapid isolation of affected assets and credential revocation to minimise blast radius.
Identity & Cloud Security

Enforce phishing-resistant MFA and oversee the security of workload identities (applications, services, scripts).
Address the growing threat of cloud identity abuse by sophisticated adversaries.
Cross-Functional Alignment

Partner with IT operations and business leaders to ensure security evolution aligns with business objectives and board-level risk management.

Required Skills & Qualifications

Advanced Threat Intelligence Expertise
Deep knowledge of modern attacker TTPs, including nation-state actors, infostealers, and cloud identity abuse.
Proven SOC Transformation Delivery
Demonstrated leadership of SOC operations with at least five successful SOC builds or rapid rebuilds, delivered from inception to live operation within 6–12 months, ideally in regulated or high-availability environments.
End-to-End Programme Ownership
Full lifecycle ownership of major initiatives including MDR consolidation, SIEM, SOAR, and security data lake deployments, delivering measurable business outcomes.
Formal RFP & Vendor Management Expertise
Proven experience authoring RFPs, evaluating vendors, and overseeing complex onboarding and integration.
Battle-Tested Incident Response
Hands-on expertise in detection, response, and automation — with a clear understanding of what succeeds (and fails) under real-world pressure.
Vendor-Neutral Technical Leadership
Ability to navigate and apply leading MDR, SIEM, SOAR, and data lake technologies agnostically to the problem being solved.
AI & Automation Proficiency
Practical experience implementing agentic assistance and managing semi-autonomous security systems.
Security Architecture Mindset
Strong commitment to Zero Trust principles and an assume-breach philosophy.
Executive-Level Communication
Ability to translate complex technical risk into business-focused metrics (e.g. response times, patch latency) for the C-suite and Board.
Mentorship & Team Evolution
Proven ability to upskill teams, fostering a culture where humans provide critical oversight and quality control over automated processes.
Analytical Rigor
Expertise in behaviour-based analytics and the use of AI to synthesise 100 trillion+ security signals into actionable intelligence.

The Future of the Role

As Lead SOC SME, you recognise that the most successful security teams are not those that automate the most, but those that empower analysts most effectively. Your goal is to build a future-state SOC where AI accelerates insight and response, while skilled practitioners retain ownership, judgement, and strategic control

Related Jobs

View all jobs

Senior Microsoft Security Specialist

Third Party Risk Lead Cyber

SOC Manager - SC Cleared - Inside IR35

SOC Threat Detection Analyst

SOC Shift Leader

SOC Shift Leader

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.

Cyber Security Jobs for Career Switchers in Their 30s, 40s & 50s (UK Reality Check)

If you’re thinking about switching into cyber security in your 30s, 40s or 50s, you’re in good company. Across the UK, organisations of all sizes are hiring people from diverse backgrounds to protect systems, data & customers. But with hype around “hackers” & quick-win courses, it’s hard to separate reality from fiction. This guide gives you a UK reality check: which roles genuinely exist, what employers actually want, how training really works, what to expect on salary & progression & whether age matters. Whether you come from finance, project management, operations, law, HR or customer service, there is a credible route into cyber security if you approach it strategically.