<?xml version="1.0" encoding="UTF-8"?>
<source>
  <jobs>
    <job>
      <externalid>9f15a44c-cc5</externalid>
      <Title>Team Lead, SOC (Security Operations Center)</Title>
      <Description><![CDATA[<p>We are looking for a SOC (Security Operations Center) Team Lead to build and lead our SOC function end-to-end. You will own vulnerability management, alerting and detection engineering, incident response, and the security tooling/infrastructure that enable these missions.</p>
<p>Key responsibilities include:</p>
<p>• Leading and growing the team: Manage the SOC team, shape the roadmap, delegate effectively, and mentor engineers.</p>
<p>• Driving operations: Define vulnerability management processes and coordinate stakeholders for timely remediation. Design, implement, and operate SIEM/SOAR infrastructure (ingestion, normalization, correlation, alerting, playbooks). Specify logging requirements across our main stacks and centralize telemetry in the SIEM. Develop and tune correlation rules and detections; manage CTI intake and operationalize intel. Run continuous improvement to reduce false positives and raise signal quality. Establish crisp procedures for alert triage, escalation, and incident handling &amp; investigation. Lead incident communications with stakeholders and ensure thorough documentation.</p>
<p>• Engineering and enablement: Contribute to security tooling, automation, and integrations that speed up detection/response. Produce guidance and documentation for product/infra teams; contribute to compliance in the SOC perimeter.</p>
<p>• Exercises and assurance: Coordinate red/blue exercises, post-mortems, and targeted audits to validate coverage and resilience.</p>
<p>The ideal candidate will have 8+ years of experience leading SOC/CSIRT functions, with proven leadership. Hands-on experience with SIEM (e.g., Elastic Security, Sekoia, Splunk) and SOAR platforms is required. Strong experience in vulnerability management (e.g., DefectDojo, Dependency-Track) and remediation workflows is also necessary. Solid grasp of the cyber kill chain / attack lifecycle, detection engineering, and log source coverage is essential. Excellent problem-solving and communication skills are required, as well as the ability to operate in a fast-paced startup environment.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>SIEM, SOAR, vulnerability management, incident response, security tooling, automation, integrations, cyber kill chain, attack lifecycle, detection engineering, log source coverage, scripting, Python, Bash, modern infra/app stacks, EDR/IDS/IPS, compliance frameworks, security audits/pen-tests</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Mistral AI</Employername>
      <Employerlogo>https://logos.yubhub.co/mistral.ai.png</Employerlogo>
      <Employerdescription>Mistral AI provides high-performance, optimized, open-source and cutting-edge AI models, products and solutions.</Employerdescription>
      <Employerwebsite>https://mistral.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/mistral/e0b55281-55c6-4143-9bf8-e4418c667f9f</Applyto>
      <Location>Paris</Location>
      <Country></Country>
      <Postedate>2026-04-17</Postedate>
    </job>
    <job>
      <externalid>3e75d44f-c7f</externalid>
      <Title>Team Lead, SOC (Security Operations Center)</Title>
      <Description><![CDATA[<p>About this role</p>
<p>We are looking for a SOC (Security Operations Center) Team Lead to build and lead our SOC function end-to-end. You will own vulnerability management, alerting and detection engineering, incident response, and the security tooling/infrastructure that enable these missions. You’ll define processes, collaborate closely with Product, Infra and IT, and continuously improve detection quality and response time.</p>
<p>Key responsibilities</p>
<p>• Lead &amp; grow the team: Manage the SOC team, shape the roadmap, delegate effectively, and mentor engineers.</p>
<p>• Drive operations:
    - Define vulnerability management processes and coordinate stakeholders for timely remediation.
    - Design, implement, and operate SIEM/SOAR infrastructure (ingestion, normalization, correlation, alerting, playbooks).
    - Specify logging requirements across our main stacks and centralize telemetry in the SIEM.
    - Develop and tune correlation rules and detections; manage CTI intake and operationalize intel.
    - Run continuous improvement to reduce false positives and raise signal quality.
    - Establish crisp procedures for alert triage, escalation, and incident handling &amp; investigation.
    - Lead incident communications with stakeholders and ensure thorough documentation.</p>
<p>• Engineering &amp; enablement:
    - Contribute to security tooling, automation, and integrations that speed up detection/response.
    - Produce guidance and documentation for product/infra teams; contribute to compliance in the SOC perimeter.</p>
<p>• Exercises &amp; assurance:
    - Coordinate red/blue exercises, post-mortems, and targeted audits to validate coverage and resilience.</p>
<p>Requirements</p>
<p>• 8+ years of experience leading SOC/CSIRT functions, with proven leadership.</p>
<p>• Hands-on with SIEM (e.g., Elastic Security, Sekoia, Splunk) and SOAR platforms.</p>
<p>• Strong experience in vulnerability management (e.g., DefectDojo, Dependency-Track) and remediation workflows.</p>
<p>• Solid grasp of the cyber kill chain / attack lifecycle, detection engineering, and log source coverage.</p>
<p>• Excellent problem-solving and communication skills; able to operate in a fast-paced startup environment.</p>
<p>• Builder mindset: pragmatic, automation-oriented, comfortable with ambiguity and ownership.</p>
<p>Nice to have</p>
<p>• Bring scripting/automation skills (e.g., Python, Bash) for data pipelines/playbooks.</p>
<p>• Know modern infra/app stacks (Linux, containers, Kubernetes, cloud), EDR/IDS/IPS.</p>
<p>• Have exposure to compliance frameworks (ISO 27001, SOC 2) and security audits/pen-tests.</p>
<p>• Have run purple team exercises and measurable detection-coverage programs.</p>
<p>• Are comfortable partnering with Product/Platform teams and influencing roadmaps.</p>
<p style="margin-top:24px;font-size:13px;color:#666;">XML job scraping automation by <a href="https://yubhub.co">YubHub</a></p>]]></Description>
      <Jobtype>full-time</Jobtype>
      <Experiencelevel>senior</Experiencelevel>
      <Workarrangement>hybrid</Workarrangement>
      <Salaryrange></Salaryrange>
      <Skills>SIEM, SOAR, vulnerability management, remediation workflows, cyber kill chain, detection engineering, log source coverage, problem-solving, communication skills, scripting/automation skills, modern infra/app stacks, EDR/IDS/IPS, compliance frameworks, security audits/pen-tests, purple team exercises</Skills>
      <Category>Engineering</Category>
      <Industry>Technology</Industry>
      <Employername>Mistral AI</Employername>
      <Employerlogo></Employerlogo>
      <Employerdescription>Mistral AI provides a comprehensive AI platform for enterprise needs, integrating seamlessly into daily working life.</Employerdescription>
      <Employerwebsite>https://mistral.ai</Employerwebsite>
      <Compensationcurrency></Compensationcurrency>
      <Compensationmin></Compensationmin>
      <Compensationmax></Compensationmax>
      <Applyto>https://jobs.lever.co/mistral/e0b55281-55c6-4143-9bf8-e4418c667f9f</Applyto>
      <Location>Paris</Location>
      <Country></Country>
      <Postedate>2026-03-10</Postedate>
    </job>
  </jobs>
</source>