SOC Manager / Incident Response and Security Operations Leadership / Remote / Full-Time
Philadelphia, PA
100% Remote
Full Time
$160k - $185k
This is an exciting full-time opportunity to join a rapidly growing MDR and cybersecurity consulting organization as a SOC Manager. You'll be working with a modern security stack leveraging SIEM/SOAR, EDR, cloud-native technologies, and advanced detection/response tools. This is a remote, Full-time, direct hire role open to candidates across the U.S.
In this role, you’ll have the chance to shape and build a team from the ground up. The company is scaling quickly, and they’re looking for a hands-on technical leader who can own SOC operations, improve detection/response maturity, and elevate service delivery across digital forensics, incident response consulting, and MDR engagements. If you’re passionate about leading while staying close to the tech, and you want a place where you can influence direction, process, and culture, this is a prime growth opportunity..
Required Skills & Experience
Tech Breakdown
The Offer
Applicants must be currently authorized to work in the US on a full-time basis now and in the future.
In this role, you’ll have the chance to shape and build a team from the ground up. The company is scaling quickly, and they’re looking for a hands-on technical leader who can own SOC operations, improve detection/response maturity, and elevate service delivery across digital forensics, incident response consulting, and MDR engagements. If you’re passionate about leading while staying close to the tech, and you want a place where you can influence direction, process, and culture, this is a prime growth opportunity..
Required Skills & Experience
- 5–7+ years of experience in cybersecurity operations, MDR, or consulting environments
- 3+ years in a leadership or management role (team lead, supervisor, SOC manager, IR lead, etc.)
- Strong technical background across digital forensics, incident response, and SOC operations
- Hands-on experience with SIEM, SOAR, EDR, and log analysis workflows
- Deep understanding of threat detection, threat hunting, and triage methodologies
- Experience building or maturing SOC processes, KPIs, and escalation workflows
- Knowledge of attacker TTPs (MITRE ATT&CK, malware analysis fundamentals, etc.)
- Experience working directly with customers in a consulting or MDR service model
- Ability to mentor, coach, and develop analysts and responders
- Certifications such as GCIA, GCFA, GCIH, GNFA, CISSP, or similar
- Experience developing detection content or playbooks (SIEM/SOAR automation)
- Experience supporting IR retainer clients or delivering IR engagements
- Exposure to cloud security environments (Azure, AWS, Google)
- Experience in fast-paced, high-growth cyber organizations.
Tech Breakdown
- 40% SIEM/SOAR Engineering & Detection Tuning
- 30% Digital Forensics & Incident Response Support
- 20% EDR Oversight, Triage & Threat Hunting
- 10% Misc. Operational Security Technologies
- 40% Hands On: escalation support, detection tuning, DFIR oversight, threat hunting
- 40% Management Duties: hiring, mentoring, process creation, performance management, stakeholder reporting
- 20% Team Collaboration: cross?functional with IR consultants, engineering, product, customer teams
The Offer
- Bonus eligible
- Medical, Dental, and Vision Insurance
- Vacation Time
- Stock Options
Applicants must be currently authorized to work in the US on a full-time basis now and in the future.