A logo

Incident Response Lead, Cyber Security

AlignerrSan Francisco, California

$40 - $80 / hour

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

Role Overview
The SOC Manager / Incident Response Lead evaluates detection workflows, response processes, playbooks, and operational readiness. This role focuses on assessing incident timelines, triage quality, escalation logic, and consistency across SOC operations.
What You’ll Do
- Review detection alerts, triage workflows, and escalation pathways
- Evaluate completeness and quality of incident response actions
- Identify gaps in logging, detection coverage, and containment logic
- Summarize incident patterns and operational bottlenecks
- Validate playbooks for clarity, accuracy, and practical feasibility
- Support recurring assessments of SOC maturity and response operations
What You Bring
Must-Have:
- Experience in SOC operations, IR leadership, or cybersecurity operations
- Strong understanding of detection engineering, response workflows, and incident timelines
- Clear analytical writing and structured documentation ability
Nice-to-Have:
- Familiarity with SIEM platforms, EDR tools, and cloud-native detection systems
$40 - $80 an hour

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall