SOC Lead
Salary undisclosed
Checking job availability...
Original
Simplified
Security Operations Center (SOC) Lead
REMOTE, Contract
Role Summary
This key role is responsible for overseeing the development and day-to-day operation of the Security Operations Center (SOC) and defensive cyber architecture which will require hiring, mentoring, training and managing analysts and engineers and ensuring cyber defensive policies and procedures are developed, documented, implemented and enforced. This role will provide overall direction for the implementation of all security monitoring functions including but not limited to systems, networks, databases, user behavior, file integrity, cloud environments, and facilitate timely remediation of identified risks and vulnerabilities. Establishing KPI s and team metrics will be fundamental to the role. The ability to keep a calm demeanor under pressure and adverse situations are a must.
This role can accommodate a flexible work arrangement where you may work multiple days a week from home.
Responsibilities:
How will you help us grow?
Lead the cyber security team responsible for implementing and operating the defensive architecture and SOC.
Lead the development and implementation of a SOC that monitors security events for anomalies and detects security incidents in a timely and efficient manner
Coordinate, measure and report on the technical aspects of security operations.
Manage the security operations and infrastructure teams that detect and thwart attacks and provide guidance on new ways of addressing threats in real-time.
Accountabilities
Design, coordinate and oversee monitoring capabilities to verify the security of systems, networks, databases, user behavior, file integrity, and cloud environments, and facilitate the remediation of identified risks and vulnerabilities.
Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements.
Drive initiatives for use case development and proper configuration of security tools to improve overall threat hunting capabilities
Requirements:
What expertise have you grown? What do you bring to the table?
Ten years experience in the cybersecurity field or related experience.
Bachelor s Degree in Computer Science, Information Technology, Engineering, or related fields.
M.B.A or M.S. in information security is preferred.
Technical Competencies
Experience implementing and managing operational security capabilities including log management, event monitoring, incident detection, data loss prevention, user behavior analytics, and vulnerability scanning.
Experience with using open source and paid threat intelligence sources.
Experience with the evaluation and selection of products and vendors to support initiatives.
Experience with conducting incident triage and investigation
Development of security plans and strategies for complex enterprises.
Implementation of complex security initiatives.
Knowledge of IT infrastructure, network protocols, and forensic data analysis
Knowledge of OT security considerations, including ICS and safety systems desired.
Exposure to R&D environments desired.
Leadership Competencies
Leadership experience as a part of transformational information or cybersecurity efforts.
Experience leading incident response or security operations center teams
Experience presenting executive level and detailed technical summary of security environment, security posture against key risk indicators.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job