Connecting clients to markets – and talent to opportunity
With 4,600 employees and over 400,000 retail and institutional clients from more than 80 offices spread across five continents, we’re a Fortune-100, Nasdaq-listed provider, connecting clients to the global markets – focusing on innovation, human connection, and providing world-class products and services to all types of investors.
At StoneX, we offer you the opportunity to be part of an institutional-grade financial services network that connects companies, organizations, and investors to the global markets ecosystem. As a team member, you'll benefit from our unique blend of digital platforms, comprehensive clearing and execution services, personalized high-touch support, and deep industry expertise. Elevate your career with us and make a significant impact in the world of global finance.
Business Segment: Engage in a deep variety of business-critical activities that keep our company running efficiently. From strategic marketing and financial management to human resources and operational oversight, you’ll have the opportunity to optimize processes and implement game-changing policies.
Primary Duties and Responsibilities:
Lead SOC operations during assigned shifts, ensuring adherence to procedures and SLA targets
Provide real-time oversight, guidance, and coaching to analysts on alerts, investigations, and incidents
Own shift turnover documentation and ensure smooth regional and time-zone handoffs
Manage escalations, coordinate response efforts, and serve as initial incident commander for priority events
Drive quality in investigations and reporting through coaching and review
Partner with Threat Intelligence and Engineering teams to validate alerts, test detection use cases, and improve processes
Contribute to SOC reporting, metrics, and continuous improvement initiatives
To Land this role you will need:
3+ years of SOC or incident response experience, with at least 1 year in a lead or mentoring capacity
Expertise in triaging alerts, investigating incidents, and interpreting detection content
Strong communicator with the ability to coach, lead under pressure, and document clearly
Familiarity with monitoring across both cloud and on-prem environments; comfort with scripting or query-building (e.g., SPL, KQL)
Ability to make sound decisions quickly, manage shifting priorities, and influence team performance in critical situations
What makes you stand out:
Exposure to MITRE ATT&CK, threat hunting, or detection engineering
Experience with SOAR platforms for automation and orchestration
Familiarity with metrics-driven SOC operations and continuous improvement practices
Formal leadership training or experience managing distributed teams
Education:
Preferred: GCIH, GCIA, SC-200, or similar practitioner-level credentials
Working environment:
4 days in office per week
On-call or after-hours availability may be required during major incidents
Minimal travel, with occasional team or leadership gatherings
Hiring Salary Range $120,000.00 - $160,000.00 per year to be determined by the education, experience, knowledge, skills and abilities of the applicant, internal equity and alignment with market data). Subject to business performance and recommendations of management, this role may be eligible to participate in an incentive compensation plan. This compensation package, in addition to a full range of medical, financial, and/or other benefits, dependent on the position, is offered.
#LI-Hybrid #LI-IM1
Software Powered by iCIMS
www.icims.com