x

Sort By

Filter Results

Location
Location
Job Title
Job Title
 
Didn't find what you are looking for?

Sign Up for Job Alerts

Never miss the latest Jobs

Email this Job to Yourself or a Friend

Refer a Friend

x
SOC Manager

SOC Manager

Location: Austin, Texas
Start Date: Apr 3, 2020

Job Description:

Are you ready to be Swoon'd?

  • Location: Austin, TX
  • Duration of Employment: 12+ Months
  • Number of Openings: 1
  • Clearance Required: Yes

Security Operations Center Manager

Candidate Description

The preferred candidate will have a total of 10 or more years' experience in the Information Technology/ Information Security industry, with minimum of 5 years of experience as a manager over a Security Operations Center. Candidate must have strong communications skills, both written and verbal, be comfortable presenting information to both technical personnel and customer managers and executives.

This is a technical management role in which the candidate must be able to manage the day-to-day activities of technical staff (security analysts and engineers) as well as lead technical discussions regarding security events and practice with technical and management audiences.  The preferred candidate must be able to demonstrate the ability to perform the tasks required to manage the security operation.  Holding one or more security related certifications (e.g., CISSP, CISM, CISA) is REQUIRED.   Holding certifications for related security technologies is a plus for this position.

This position is based in AUSTIN, TX, and will support the customer’s 24x7 Security Operations Center (SOC). This position is in direct support (on-site at customer facilities) of a customer in the government sector.  This client is providing Managed Security Service Provider (MSSP) functions related to the Security Operations Center (SOC) including Tier 1 through Tier 3 resource capabilities and activities related to security monitoring, threat, and vulnerability management and incident response (IR).  Preference will be made for candidates who can support ‘non-business hours’ shifts.

Selected candidates must be US Citizens, pass a CJIS background check process, and complete basic safety and security training to meet the customer requirements.

Responsibilities

  • Supervise and monitor the quality of services provided.
  • Recruit, select, train, assign, schedule, coach, counsel staff.
  • Communicate job expectations; planning, monitoring, appraising and reviewing job contributions.
  • Act as liaison between the Security Operations team and the customer’s technical management staff.
  • Prepare and complete security action plans; implement production, productivity, quality and customer-service standards; resolve problems; complete audits; identify trends.
  • Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
  • Perform cyber defense trend analysis and reporting.
  • Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
  • Provide daily summary reports of network events and activity relevant to cyber defense practices.
  • Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings).
  • Review and approve procedures and work instructions for use by the SOC staff (Tier 1 through Tier 3).
  • Train and mentor the Tier 3 analysts and engineers as needed.
  • Provide cybersecurity recommendations to leadership based on significant threats and vulnerabilities.
  • Inform senior management about performance and issues, including escalations.
  • Monitor and manage customer SLA compliance for SOC.
  • Monitor documentation to ensure accuracy and quality.
  • Establish professional development programs with Training Coordinator for personnel.

Qualifying Experience and Attributes

  • Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
  • Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute). 
  • Knowledge of computer networking concepts and protocols, and network security methodologies. 
  • Knowledge of cybersecurity and privacy principles. 
  • Knowledge of cyber threats and vulnerabilities. 
  • Knowledge of encryption algorithms, cryptography, and cryptographic key management concepts. 
  • Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists). 
  • Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins). 
  • Knowledge of incident response and handling methodologies. 
  • Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). 
  • Knowledge of network traffic analysis methods. 
  • Knowledge of new and emerging information technology (IT) and cybersecurity technologies. 
  • Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
  • Knowledge of key concepts in security management (e.g., Release Management, Patch Management).
  • Knowledge of security system design tools, methods, and techniques.
  • Knowledge of Virtual Private Network (VPN) security.
  • Knowledge of what constitutes a network attack and its relationship to both threats and vulnerabilities. 
  • Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations. 
  • Knowledge of adversarial tactics, techniques, and procedures. 
  • Knowledge of network tools (e.g., ping, traceroute, nslookup) 
  • Knowledge of defense-in-depth principles and network security architecture.
  • Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN).
  • Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip).
  • Knowledge of interpreted and compiled computer languages.
  • Knowledge of cyber defense and information security policies, procedures, and regulations. 
  • Knowledge of the common attack vectors on the network layer.
  • Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). 
  • Knowledge of cyber attackers (e.g., script kiddies, insider threat, nation/non-nation state sponsored). 
  • Knowledge of system administration, network, and operating system hardening techniques.
  • Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). 
  • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). 
  • Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. 
  • Signature implementation impact for viruses, malware, and attacks. 
  • Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).
  • Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications.
  • Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
  • Knowledge of how to use network analysis tools to identify vulnerabilities.
  • Knowledge of penetration testing principles, tools, and techniques.
  • Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort).
  • Skill in using protocol analyzers.
  • Skill in collecting data from a variety of cyber defense resources.
  • Skill in recognizing and categorizing types of vulnerabilities and associated attacks.
  • Skill in reading and interpreting signatures (e.g., snort).
  • Skill in performing packet-level analysis.
  • US Citizen and must be able to pass background check(s)

#dcejobs

Id: 41651

Apply for SOC Manager

Fill out the form below to submit information for this opportunity. Please upload your resume as a doc, pdf, rtf or txt file. Your information will be processed as soon as possible.
Full Name
Email
Phone
City
State
Resume