×
Register Here to Apply for Jobs or Post Jobs. X

Security Operations Center; SOC Manager

Job in Bengaluru, 560001, Bangalore, Karnataka, India
Listing for: Confidential
Full Time position
Listed on 2026-02-05
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager, Network Security
Job Description & How to Apply Below
Position: Security Operations Center (SOC) Manager
Location: Bengaluru

About Color Tokens
At  Color Tokens , we empower businesses to stay operational and resilient in an increasingly complex cybersecurity landscape. Breaches happen—but with our cutting-edge  Color Tokens Xshield™ platform , companies can minimize the impact of breaches by preventing the lateral spread of ransomware and advanced malware. We enable organizations to continue operating while breaches are contained, ensuring critical assets remain protected.
Our innovative platform provides unparalleled visibility into traffic patterns between workloads, OT/IoT/IoMT devices, and users, allowing businesses to enforce granular micro-perimeters, swiftly isolate key assets, and respond to breaches with agility. Recognized as a  Leader in the Forrester Wave™:
Microsegmentation Solutions (Q3 2024) , Color Tokens safeguards global enterprises and delivers significant savings by preventing costly disruptions.
Join us in transforming cybersecurity. Learn more at

Job Summary:

Colortokens is seeking a SOC Manager to lead our Security Operations Center (SOC), leveraging Next-Gen SIEM to detect, respond to, and mitigate security threats. The ideal candidate will have deep expertise in modern SIEM platforms, threat intelligence, and incident response while managing customers and a team of security analysts.

Job Title:

SOC Manager

Location:

Bangalore
Job Type:  Full-time
Department:  Managed Services

Key Responsibilities:

1. SOC Leadership & Operations
Oversee 24/7 security monitoring, detection, and response operations.
Manage, mentor, and train a team of SOC analysts, engineers, and incident responders.
Develop and optimize SOC processes, playbooks, and runbooks for effective incident handling.
Ensure continuous threat monitoring, analysis, and escalation in accordance with SLAs.
2. SIEM & Security Analytics Management
Implement, manage, and optimize Next-Gen SIEM solutions (eg: Stellar Cyber, Cortex, Chronicle etc)
Develop advanced detection rules, correlation logic, and behavioural analytics for real-time threat detection.
Integrate SIEM with EDR, NDR, SOAR, Threat Intelligence, and Cloud Security tools.
Ensure log management, normalization, and enrichment from various sources (firewalls, endpoints, cloud, IAM, etc.).
3. Threat Detection, Incident Response & Forensics
Lead security investigations, threat hunting, and forensics analysis.
Work with SOC analysts to triage and escalate security incidents (MITRE ATT&CK-based).
Oversee the incident response process and conduct post-mortem analysis for continuous improvement.
Collaborate with threat intelligence teams to enrich SIEM detections with contextual threat data.
4. Compliance, Reporting & Automation
Ensure SOC operations align with regulatory standards (ISO 27001, NIST, GDPR, SOC 2, etc.).
Develop automated detection & response workflows using SOAR (Security Orchestration, Automation, and Response).
Generate SIEM dashboards, security reports, and executive summaries for stakeholders.
Conduct tabletop exercises and Red/Blue team drills to enhance security readiness.
5. Customer & Stakeholder Engagement
Act as the primary point of contact for key customers, ensuring high-quality service delivery.
Collaborate with OEMs to address cybersecurity risks.
Present threat intelligence reports, risk assessments, and incident trends to executive stakeholders.
Drive continuous improvement initiatives based on customer feedback and security landscape changes.
Customer SLA management and ensure CSAT of greater than 4.5/5
6. Business Support
Work with pre-sales teams to respond to customer RFI/RFPs
Responsible for upsell and cross-sell activities
Enable/train sales teams across regions
7. Required

Skills & Experience:

Technical Expertise:
12-15 years of experience in SOC operations, SIEM, and cybersecurity incident response.
Hands-on expertise with Next-Gen SIEM platforms.
Proficiency in SOAR, EDR, XDR, Cloud Security (AWS/Azure/GCP), and threat intelligence tools.
Strong knowledge of MITRE ATT&CK, Cyber Kill Chain, and NIST frameworks.
Experience in log analysis, anomaly detection, and SIEM rule creation.
Scripting skills in Python, Power Shell, or Regex for automation.
Leadership &

Soft Skills:

Strong leadership experience in managing and mentoring SOC teams.
Excellent incident response and crisis management abilities.
Effective communication with technical and non-technical stakeholders including customers.
Ability to collaborate with IT, Dev Ops, and security teams to enhance security posture.
Preferred

Certifications:

✔  CISSP  (Certified Information Systems Security Professional)
✔  GCIA  (GIAC Certified Intrusion Analyst)
✔  GCIH  (GIAC Certified Incident Handler)
✔  SIEM Vendor Certifications

Skills:

SOC Manager, SOC Process, CISSP, Pre-Sales Activities, SOC Setup Experience.
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary