About Match Group
Match Group (NASDAQ: MTCH) is a leading provider of dating products across the globe, operating a portfolio of brands including Tinder, Hinge, Match, OkCupid, Pairs, Meetic, and more. With hundreds of millions of users worldwide generating billions of interactions daily, our scale demands world-class security operations.
About the Team
The MG Security Engineering organization provides unified security services across all Match Group brands. The Monitoring, Incident Response & SOC team is responsible for real-time threat detection, investigation, and response across the full portfolio — operating 24/7 to ensure security alerts are effectively triaged and responded to, minimizing the impact of potential threats.
About the Role
As the Manager, IR / SOC, you will lead the integrated team responsible for Detection Engineering, Security Operations Center (SOC), and Incident Response (IR) across Match Group. Reporting to the Sr. Director of Security Engineering, you will drive the strategic vision of maximizing rapid and accurate threat response capabilities by integrating these three core functions and leveraging AI-driven innovation.
You will own the detection lifecycle end-to-end — from signal engineering and alert tuning through triage, investigation, and incident resolution — while building toward an AI-augmented SOC model that reduces noise, accelerates response, and scales across a global portfolio.
What You'll Do
- Lead and develop a high-performing team of SOC analysts, detection engineers, and incident responders operating across multiple time zones with 24/7 coverage
- Play a key role in developing the detection engineering framework, contributing to detections-as-code (DaC) via GitOps/CI/CD pipelines for consistency and automated deployment
- Drive AI Agentic SOC adoption — evaluate, select, and implement AI-driven triage and investigation tooling to maximize SOC efficiency, reduce false positives, and accelerate initial response speed
- Manage the full incident lifecycle — from detection through containment, eradication, recovery, and lessons learned — partnering with Legal, Communications, Privacy, and Engineering teams
- Build and refine detection content across the SIEM platform, integrating log sources across all MG brands (Tinder, Hinge, Match, E&E, HPCNT, Eureka, and New Bets)
- Establish and track SOC metrics and SLAs, creating dashboards to visualize performance, alert fidelity, and response effectiveness
- Coordinate and execute IR tabletop exercises (technical and management-level) across brands to validate readiness and improve playbooks
- Partner with the Red Team to validate detection capabilities through adversary simulation and assumed-compromise testing
- Collaborate with Platform Security, InfraSec, and AppSec teams to identify and close detection gaps across cloud-native and hybrid environments (AWS, GCP), datacenter infrastructure, endpoints (CrowdStrike), identity (Okta), SaaS, and application layers
- Integrate threat intelligence into detection and response workflows to anticipate and proactively defend against emerging threats
- Use automation to improve detection and response times and mitigate incident impact
What You'll Bring
- 5+ years of experience in security operations, incident response, detection engineering, or threat hunting, with 2+ years in a team leadership or management role
- Proven experience building and operating a modern SOC in cloud-native and hybrid environments (AWS, GCP) and datacenter infrastructure
- Hands-on experience with SIEM platforms and SOAR tools — including detection-as-code methodologies
- Strong understanding of AI/ML applications in security operations — agentic SOC, automated triage, and intelligent alert enrichment
- Experience managing the full incident lifecycle across complex, multi-brand or multi-tenant environments
- Deep knowledge of attacker TTPs (MITRE ATT&CK), endpoint and network forensics, and threat hunting techniques
- Experience with cloud security monitoring (AWS CloudTrail, GuardDuty, Security Hub, CloudWatch; GCP Security Command Center), datacenter security, and container orchestration security (Kubernetes)
- Familiarity with identity and access security monitoring (Okta, SSO, MFA events)
- Experience coordinating with external incident response teams, law enforcement, and cross-functional stakeholders during security events
- Polished verbal and written communication skills — ability to communicate clearly during high-pressure incidents and deliver thorough post-incident reports to technical and executive audiences
- Relevant certifications are a plus: GCIH, GCFA, GCIA, GSOM, CISSP, or equivalent
Nice to Have
- Experience with Python-based detections and log analysis in modern cloud-native SIEM platforms
- Background in the consumer internet/dating industry or other high-scale B2C platforms
- Familiarity with Cloudflare (WAF, Bot Management), CrowdStrike, and SaaS security monitoring (Obsidian or similar)
- Experience building or leading a Blue Team volunteer program or cross-functional security response team
Salary
$170,000 - $190,000 a year
Factors such as scope and responsibilities of the position, candidate's work experience, education/training, job-related skills, internal peer equity, as well as market and business considerations may influence base pay offered.
This salary range is reflective of Vancouver, Canada. For all other locations, this salary may be subject to a geographic adjustment (according to a specific city and state), if an authorization is granted to work outside of the location listed in this posting.
Why Match Group?
Our mission is simple – to help people find love and happiness! We love our employees too and understand the importance of all life's milestones. Here are some of the benefits we are proud to offer:
Mind & Body – Medical, mental health, and wellness benefits to support your overall health and well-being
Financial Wellness – Competitive compensation, 100% employer match on 401k contributions up to 10% (cap at $10,000), as well as an employee stock purchase program to help you feel supported in your financial security
Unplug – Generous PTO and 14 paid holidays so you can unplug
Career – Annual training allowance for professional development and ERG membership opportunities and events so you feel connected and empowered in your work
Family – Families come in all shapes and sizes so we offer 20 weeks of 100% paid parental leave, fertility, adoption, and child care resources, as well as pet insurance and discounts
Company Gatherings – We host company events where our employees get to know each other and build a sense of connection and belonging!