Security Operations Center Manager

The Security Operations Center Manager will coordinate and lead security analysts, orchestrate analytical efforts and manage time and schedules to ensure service level agreements and objectives are met by the SOC. The Manager is expected to be technically capable as an analyst and work with stakeholder leadership to ensure highly professional delivery of services. The Manager reviews issues and threats and coordinates directly with clients as needed. The SOC manager is capable of coordination in the event of an incident response and provide necessary leadership. As this role is operational based and managerial, the role requires measuring staff performance for assigned staff. This role is leadership by example and requires a technical proficiency especially in managing SIEM solutions in Security Operations Centers.

JOB RESPOSIBILITES

  • Manage the operational Security Operations Center(s) and staff
  • Deliver monitoring and security services in accordance with established agreements with organizational stakeholders
  • Coordinate staff and schedules to ensure continuity in incident/case management as applicable
  • Ensure confidentiality where applicable and strictly enforce data protection and data protection policies
  • Track and report staff issues and work to eliminate impedances to progress
  • Deliver both internal reports and on-demand reports as needed
  • Maintain monthly staffing metrics and operational metrics related to quality, accuracy, and timeliness of deliveries and performance
  • Coordinate with internal stakeholders to standardize technology solutions across the organization as applicable
  • Perform administrative tasks necessary to manage direct reports - time sheet approval, performance reviews and feedback, career development, etc.
  • Consult with and take direction from supervisors, technical account managers, and clients regarding case investigation and status

REQUIRED SKILLS AND QUALIFICATIONS
  • Should have 4 years experience in delivering managed security services.
  • Demonstrate working with senior management through expert services such as client consulting
  • Support digital forensics and manage incident response
  • Must have direct working experience with all major OS such as Windows/Mac/Linux
  • Should have operational understanding of NSM, SIEM, and ETDR technologies
  • Should have strong networking protocol knowledge
  • Able to work off hours and travel internationally on rare occasion
  • Detail-oriented and able to work independently and communicate effectively both verbally and in writing
  • Must be able to establish priorities, work independently and lead assigned staff to complete objectives
  • Ability to develop/follow standard processes and complete documentation
  • College degree preferred in the field of Computer Science, Programming, Network Engineering
  • Should have technical security certification in incident response
  • Certified Information Systems Security Professional (CISSP) or equivalent preferred



Back to top