Question
A jornada completa
10+

Security Operations Leader (SOC)

3/30/2026

The Security Operations Leader will oversee the design, operation, and continuous improvement of security monitoring, detection, triage, and incident response across internal, MSSP, or hybrid SOC models. Key duties include leading end-to-end incident response, defining the SOC operating model, and ensuring threat detection aligns with enterprise risk and CISO strategy.

Working Hours

40 hours/week

Company Size

501-1,000 employees

Language

English

Visa Sponsorship

No

About The Company
Telstar is a leading global brand of aseptic process solutions. The company, part of Syntegon, specializes in the development of GMP consultancy, engineering & construction projects, and integrated process equipment for companies associated with life & health sciences markets (pharmaceutical & biotechnology, healthcare, cosmetic, veterinary, and food & beverage industries), as well as hospitals, laboratories & research centres. Telstar operates in over a hundred countries and has production plants in Spain and China and ten consultancy and engineering services centres, and commercial offices all over the world.
About the Role

Descripción de la empresa

Syntegon Telstar S.R.U is a company belonging to the Syntegon Group, which operates worldwide.
As a brand specialising in the development of GMP consulting, engineering, construction and integrated process equipment projects, we serve companies linked to the life sciences market (pharmaceutical and biotechnology, healthcare, cosmetics, veterinary and food industries), as well as hospitals, laboratories and research centres. We also offer solutions using vacuum and high vacuum technologies for traditional and high-tech industries in the energy and aerospace sectors, as well as scientific experimentation.

 

Descripción del empleo

We are looking for a Security Operations Leader (SOC) to join our team at our offices in Terrassa (Barcelona). The role aims to oversee the design, operation, and continuous improvement of security monitoring, detection, triage, and incident response (IR) across either an internal SOC or a Managed Security Service Provider (MSSP) / MDR model—or a hybrid of both. The SOC Leader ensures threats are detected early, investigations are timely and effective, and incidents are contained and remediated with minimal business impact. The role aligns SOC operations with enterprise risk, regulatory requirements, and the security strategy defined by the CISO.

Key Responsibilities

Strategy & Governance

Develop and own the SOC operating model (internal, external, or hybrid), aligned to the enterprise cyber risk appetite and CISO strategy.

Define and maintain SOC policies, playbooks, runbooks, and standard operating procedures (SOPs).

Establish detection and response strategy across the kill chain/attack lifecycle, mapping to frameworks (e.g., MITRE ATT&CK, NIST CSF, ISO 27001).

Maintain a risk-based, threat-informed defense program, including threat modeling and purple teaming cycles.

Operations & Incident Response

Lead end-to-end incident response: detection → triage → investigation → containment → eradication → recovery → lessons learned.

Oversee alert quality, triage workflows, case management, and shift handoffs for 24x7 coverage.

Ensure high-fidelity detections and reduce noise via SIEM/SOAR tuning, use case management, and threat intel enrichment.

Chair post-incident reviews and drive corrective actions with owners across IT/Cloud/AppSec/Identity/OT.

Coordinate executive communications during major incidents and provide timely updates to the CISO and relevant stakeholders.

Internal SOC Management (if in-sourced)

Build and lead a high-performing SOC team (Tier 1–3 Analysts, IR handlers, Threat Hunters, SIEM/SOAR Engineers).

Own workforce planning, scheduling, training, mentoring, and career development.

Drive engineering backlog and continuous improvement (detection engineering, automation, log onboarding).

Ensure secure, reliable, and cost-effective SOC tooling and data pipelines (e.g., SIEM, EDR/XDR, NDR, IAM signals, Cloud telemetry).

External SOC / MSSP Management (if out-sourced)

Own vendor selection, onboarding, contract/SLA/OLA definitions, and quarterly business reviews (QBRs).

Manage day-to-day provider performance, service quality, escalation paths, and continuous service improvement plans (CSIPs).

Validate provider’s detections, playbooks, threat intel sources, and incident handling quality.

Ensure data residency, privacy, and audit requirements are met; coordinate evidence collection and chain-of-custody.

Collaboration & Stakeholder Management

Partner with IT Operations, Cloud, DevOps, Network, Endpoint, Identity, and OT/IIoT teams for rapid response and remediation.

Collaborate with Threat Intelligence, Red/Purple Teams, and Vulnerability Management to align detections with evolving threats and attack paths.

Enable business units with playbooks, tabletop exercises, and awareness on escalation criteria and incident roles.

Risk, Compliance & Audit

Ensure SOC controls support compliance requirements (e.g., ISO 27001, NIST 800-53, GDPR, NIS2 as applicable).

Maintain audit-ready evidence for monitoring, alerting, IR processes, and SLAs/OLAs.

Lead SOC self-assessments, maturity roadmaps (e.g., based on MITRE SOC Evaluations/NIST CSF maturity), and external audits.

Metrics, Reporting & Communication

Define and report SOC KPIs/KRIs to the CISO and governance forums; drive data-driven improvements.

Provide executive-ready dashboards and incident summaries, including business impact and time-to-recover.

Produce threat trend analyses and quarterly posture reports with investment recommendations.

Key Responsibilities by Model

Internal SOC (In-sourced)

Recruit, retain, and upskill analysts and engineers; build tiering and career paths.

Own backlog for detections, automations, and enrichment pipelines; manage change and release for SOC content.

Operate shift schedules (24x7, follow-the-sun, or on-call) and ensure resilient coverage.

External SOC (Outsourced/MSSP/MDR)

Define interfaces (RACI/RAAS), escalation matrices, and evidence requirements.

Validate detections with realistic attack simulations and joint exercises.

Monitor and enforce SLAs/OLAs; ensure contractual alignment with risk posture and compliance needs.

Leadership Competencies

Decision-making under pressure: Calm, structured incident leadership.

Strategic thinking: Aligns SOC investments with business risk and measurable outcomes.

People leadership: Develops talent, builds an inclusive high-performance culture.

Influence & communication: Trusted advisor to the CISO and executive stakeholders.

Continuous improvement: Data-driven mindset; automates relentlessly.

Reporting & Escalation

Reports directly to the CISO; serves as primary incident commander for significant security events.

Provides weekly operational summaries, monthly KPI dashboards, and quarterly executive reviews.

Immediate escalation for potential material/business-impacting incidents per policy.

Requisitos

Required qualification:

 

8–12+ years in cybersecurity with 4+ years leading SOC operations or Incident Response teams (internal or MSSP).

Hands-on expertise with SIEM (e.g., Microsoft Sentinel), EDR/XDR (e.g., Defender for Endpoint), SOAR, NDR, and cloud telemetry (Azure/M365, AWS, GCP).

Strong knowledge of modern attacker TTPs (MITRE ATT&CK), detections engineering, use-case lifecycle, and automation with SOAR.

Proven track record managing critical incidents and executive communications.

Experience with vendor management, contract/SLA governance, and service reviews (for external SOC models).

Familiarity with regulatory and audit frameworks (NIST, ISO 27001, etc.).

Excellent leadership, coaching, and cross-functional collaboration skills.

Strong written and verbal communication—capable of translating technical detail into business risk and impact.

Preferred qualification:

Certifications: CISSP, CISM, GIAC (GCIA, GCED, GCIH, GCFA/GCFR, GMON), Microsoft SC-200/SC-100, Azure/AWS security certs.

Experience with threat hunting, offensive security, or purple teaming.

Background in large-scale log onboarding, data normalization, content engineering, and cost-optimized telemetry strategies.

Experience in OT/ICS security (if relevant to the business).

Exposure to data privacy and eDiscovery needs during investigations.

High level of English, both written and spoken.

Be fluent in Spanish and German is a plus.

Información adicional

Additional Information

  • Availability to travel (approximately 10–20%) when required (HQ in Germany).

  • Valid driving license and own vehicle.

Por Syntegon y sus subsidiarias, la diversidad es una preocupación clave. Exclusivamente promovemos un ambiente donde todos los empleados, independientemente de su género, edad, origen, religión, orientación sexual, identidad de género o necesidades especiales, sean tratados de manera equitativa. Si esta oferta de trabajo utiliza únicamente la forma masculina, es por razones de legibilidad y se refiere a individuos de todos los géneros.

  • Working hours: Full-time
  • Functional Area (career page): IT
  • Legal Entity: Syntegon Telstar Technologies, S.L.U.
  • Key Skills
    Security Operations Center (SOC)Incident Response (IR)SIEMSOAREDR/XDRNDRThreat IntelligenceMITRE ATT&CKNIST CSFISO 27001Threat ModelingPurple TeamingVendor ManagementAutomationDetection EngineeringCloud Telemetry
    Categories
    Security & SafetyTechnologyManagement & LeadershipData & Analytics
    Apply Now

    Please let SYNTEGON know you found this job on InterviewPal. This helps us grow!

    Apply Now
    Prepare for Your Interview

    We scan and aggregate real interview questions reported by candidates across thousands of companies. This role already has a tailored question set waiting for you.

    Elevate your application

    Generate a resume, cover letter, or prepare with our AI mock interviewer tailored to this job's requirements.