MENU
  • Remote Jobs
  • Companies
  • Go Premium
  • Job Alerts
  • Post a Job
  • Log in
  • Sign up
Working Nomads logo Working Nomads
  • Remote Jobs
  • Companies
  • Post Jobs
  • Go Premium
  • Get Free Job Alerts
  • Log in

Security Operations Manager

Apollo.io

Full-time
Poland
operations management
security
operations
leadership
documentation
Apply for this position

**This is a Permanent role ('Umowa o pracę') and not a B2B contract**

Role Overview

The Security Operations Manager is a hands-on leader responsible for ensuring Apollo’s ability to detect, investigate, respond to, and recover from security incidents effectively and at scale. This role blends strong people leadership, cross-functional collaboration, and deep technical expertise in modern security operations. The Manager is expected to lead by example, remain technically engaged, and actively contribute to investigations and high-severity incidents.

This role operates in a fully remote environment and requires excellent asynchronous communication and collaboration skills.

Key Responsibilities

Operational Leadership & Incident Response

  • Own and continuously improve end-to-end Security Operations processes, including detection, investigation, escalation, response, and post-incident activities.

  • Act as senior incident leader for high-severity incidents, ensuring timely containment, calm and structured decision-making, and clear stakeholder communication.

  • Lead and participate in complex security investigations spanning cloud infrastructure, SaaS platforms, corporate systems, user behavior, and abuse scenarios.

  • Ensure high-quality post-incident reviews with clear root cause analysis, actionable remediation, and accountability for follow-through.

Detection, SIEM & Automation Strategy

  • Define and evolve SIEM strategy, including log source onboarding, detection use cases, alert tuning, data quality standards, and coverage validation.

  • Oversee creation and maintenance of detection logic, correlation rules, investigation playbooks, and response workflows.

  • Drive automation and orchestration initiatives to reduce manual effort and accelerate triage and response.

  • Champion the use of AI-assisted tools and techniques to expedite investigation, enrichment, decision-making, and response.

People Leadership, Culture & Growth

  • Build, lead, and retain a high-performing Security Operations team in a fully remote, distributed environment.

  • Foster a culture of trust, psychological safety, operational excellence, and continuous learning.

  • Provide clear expectations, regular feedback, and coaching aligned with individual strengths and career aspirations.

  • Establish and maintain clear career growth paths, helping engineers develop technical depth, operational ownership, and leadership capabilities.

  • Support onboarding, mentorship, documentation, and knowledge-sharing practices to strengthen team resilience and reduce single points of failure.

Cross-Functional Collaboration

  • Partner closely with Engineering, IT, Fraud, Legal, People, Support, and Product teams during investigations, incidents, and improvement initiatives.

  • Collaborate deeply with Fraud teams on abuse, account compromise, automation misuse, and anomalous behavior investigations.

  • Communicate security risk, incident impact, and remediation plans clearly to both technical and non-technical stakeholders.

Metrics, Reporting & Strategy

  • Define, track, and improve operational security metrics such as detection quality, investigation effectiveness, response outcomes, and incident trends.

  • Translate business risk and platform changes into actionable operational priorities and roadmap initiatives.

  • Contribute to the long-term Security Operations strategy for a cloud-native, SaaS-first platform, with GCP as the primary cloud environment.

Required Skills & Experience

(We expect strong candidates to meet most of these requirements; seniority may be calibrated based on demonstrated scope and impact.)

  • 7+ years of experience in Security Operations, Incident Response, or Security Engineering.

  • 3+ years of people management experience, including hiring, coaching, and performance management, ideally in a remote-first environment.

  • Strong hands-on experience with SIEM platforms (experience with Panther is highly valued), detection engineering, log analysis, and security investigations.

  • Experience designing and automating security workflows and response processes.

  • Experience with cloud-native platforms (GCP preferred; AWS and Azure also relevant) and SaaS applications.

  • Proficiency in Python for automation, analysis, and tooling; familiarity with Ruby is a plus.

  • Excellent written and verbal communication, leadership, and stakeholder management skills.

Preferred Qualifications

  • Experience using AI or ML-assisted security tooling for detection, investigation, or response.

  • Familiarity with vulnerability management programs, SLAs, and remediation workflows.

  • Relevant certifications such as CISSP, GCIA, GCIH, GCED, or Google Professional Cloud Security Engineer / AWS Security Specialty.

Apply for this position
Bookmark Report

About the job

Full-time
Poland
Senior Level
Posted 3 hours ago
operations management
security
operations
leadership
documentation

Apply for this position

Bookmark
Report
Enhancv advertisement
+ 1,284 new jobs added today
30,000+
Remote Jobs

Don't miss out — new listings every hour

Join Premium

Security Operations Manager

Apollo.io

**This is a Permanent role ('Umowa o pracę') and not a B2B contract**

Role Overview

The Security Operations Manager is a hands-on leader responsible for ensuring Apollo’s ability to detect, investigate, respond to, and recover from security incidents effectively and at scale. This role blends strong people leadership, cross-functional collaboration, and deep technical expertise in modern security operations. The Manager is expected to lead by example, remain technically engaged, and actively contribute to investigations and high-severity incidents.

This role operates in a fully remote environment and requires excellent asynchronous communication and collaboration skills.

Key Responsibilities

Operational Leadership & Incident Response

  • Own and continuously improve end-to-end Security Operations processes, including detection, investigation, escalation, response, and post-incident activities.

  • Act as senior incident leader for high-severity incidents, ensuring timely containment, calm and structured decision-making, and clear stakeholder communication.

  • Lead and participate in complex security investigations spanning cloud infrastructure, SaaS platforms, corporate systems, user behavior, and abuse scenarios.

  • Ensure high-quality post-incident reviews with clear root cause analysis, actionable remediation, and accountability for follow-through.

Detection, SIEM & Automation Strategy

  • Define and evolve SIEM strategy, including log source onboarding, detection use cases, alert tuning, data quality standards, and coverage validation.

  • Oversee creation and maintenance of detection logic, correlation rules, investigation playbooks, and response workflows.

  • Drive automation and orchestration initiatives to reduce manual effort and accelerate triage and response.

  • Champion the use of AI-assisted tools and techniques to expedite investigation, enrichment, decision-making, and response.

People Leadership, Culture & Growth

  • Build, lead, and retain a high-performing Security Operations team in a fully remote, distributed environment.

  • Foster a culture of trust, psychological safety, operational excellence, and continuous learning.

  • Provide clear expectations, regular feedback, and coaching aligned with individual strengths and career aspirations.

  • Establish and maintain clear career growth paths, helping engineers develop technical depth, operational ownership, and leadership capabilities.

  • Support onboarding, mentorship, documentation, and knowledge-sharing practices to strengthen team resilience and reduce single points of failure.

Cross-Functional Collaboration

  • Partner closely with Engineering, IT, Fraud, Legal, People, Support, and Product teams during investigations, incidents, and improvement initiatives.

  • Collaborate deeply with Fraud teams on abuse, account compromise, automation misuse, and anomalous behavior investigations.

  • Communicate security risk, incident impact, and remediation plans clearly to both technical and non-technical stakeholders.

Metrics, Reporting & Strategy

  • Define, track, and improve operational security metrics such as detection quality, investigation effectiveness, response outcomes, and incident trends.

  • Translate business risk and platform changes into actionable operational priorities and roadmap initiatives.

  • Contribute to the long-term Security Operations strategy for a cloud-native, SaaS-first platform, with GCP as the primary cloud environment.

Required Skills & Experience

(We expect strong candidates to meet most of these requirements; seniority may be calibrated based on demonstrated scope and impact.)

  • 7+ years of experience in Security Operations, Incident Response, or Security Engineering.

  • 3+ years of people management experience, including hiring, coaching, and performance management, ideally in a remote-first environment.

  • Strong hands-on experience with SIEM platforms (experience with Panther is highly valued), detection engineering, log analysis, and security investigations.

  • Experience designing and automating security workflows and response processes.

  • Experience with cloud-native platforms (GCP preferred; AWS and Azure also relevant) and SaaS applications.

  • Proficiency in Python for automation, analysis, and tooling; familiarity with Ruby is a plus.

  • Excellent written and verbal communication, leadership, and stakeholder management skills.

Preferred Qualifications

  • Experience using AI or ML-assisted security tooling for detection, investigation, or response.

  • Familiarity with vulnerability management programs, SLAs, and remediation workflows.

  • Relevant certifications such as CISSP, GCIA, GCIH, GCED, or Google Professional Cloud Security Engineer / AWS Security Specialty.

Working Nomads

Post Jobs
Premium Subscription
Sponsorship
Reviews
Job Alerts

Job Skills
Jobs by Location
Jobs by Experience Level
API
FAQ
Privacy policy
Terms and conditions
Contact us
About us

Jobs by Category

Remote Administration jobs
Remote Consulting jobs
Remote Customer Success jobs
Remote Development jobs
Remote Design jobs
Remote Education jobs
Remote Finance jobs
Remote Legal jobs
Remote Healthcare jobs
Remote Human Resources jobs
Remote Management jobs
Remote Marketing jobs
Remote Sales jobs
Remote System Administration jobs
Remote Writing jobs

Jobs by Position Type

Remote Full-time jobs
Remote Part-time jobs
Remote Contract jobs

Jobs by Region

Remote jobs Anywhere
Remote jobs North America
Remote jobs Latin America
Remote jobs Europe
Remote jobs Middle East
Remote jobs Africa
Remote jobs APAC

Jobs by Skill

Remote Accounting jobs
Remote Assistant jobs
Remote Copywriting jobs
Remote Cyber Security jobs
Remote Data Analyst jobs
Remote Data Entry jobs
Remote English jobs
Remote Entry Level jobs
Remote Spanish jobs
Remote Project Management jobs
Remote QA jobs
Remote SEO jobs

Jobs by Country

Remote jobs Australia
Remote jobs Argentina
Remote jobs Belgium
Remote jobs Brazil
Remote jobs Canada
Remote jobs Colombia
Remote jobs France
Remote jobs Germany
Remote jobs Ireland
Remote jobs India
Remote jobs Japan
Remote jobs Mexico
Remote jobs Netherlands
Remote jobs New Zealand
Remote jobs Philippines
Remote jobs Poland
Remote jobs Portugal
Remote jobs Singapore
Remote jobs Spain
Remote jobs UK
Remote jobs USA


Working Nomads curates remote digital jobs from around the web.

© 2026 Working Nomads.