SOC Manager

2 months ago


Austin, United States TEKsystems Full time
Job DescriptionJob Description

Top Skills' Details

Experience as a manager over a Security Operations Center.
Experience as a technical manager in which the candidate must be able to manage the day-to-day activities of technical staff (security analysts and engineers) as well as lead technical discussions regarding security events and practice with technical and management audiences
Expert knowledge around the tools used in building a SOC and supporting it day to day
Experience in an MSP would also be ideal
 

Job Description

Candidate Description
The preferred candidate will have a total of 10 or more years' experience in the Information Technology/ Information Security industry, with minimum of 5 years of experience as a manager over a Security Operations Center. Candidate must have strong communications skills, both written and verbal, be comfortable presenting information to both technical personnel and customer managers and executives.

This is a technical management role in which the candidate must be able to manage the day-to-day activities of technical staff (security analysts and engineers) as well as lead technical discussions regarding security events and practice with technical and management audiences. The preferred candidate must be able to demonstrate the ability to perform the tasks required to manage the security operation. Holding one or more security related certifications (e.g., CISSP, CISM, CISA) is REQUIRED. Holding certifications for related security technologies is a plus for this position.

This position is based in AUSTIN, TX, and will support the customer’s 24x7 Security Operations Center (SOC). This position is in direct support (on-site at customer facilities) of the customer in the government sector. Client is providing Managed Security Service Provider (MSSP) functions related to the Security Operations Center (SOC) including Tier 1 through Tier 3 resource capabilities and activities related to security monitoring, threat, and vulnerability management and incident response (IR). The position is in a supporting role to the SOC Manager with specific work assigned by the SOC Manager. Preference will be made for candidates who can support ‘non-business hours’ shifts.

Selected candidates must be US Citizens, pass a CJIS background check process, and complete basic safety and security training to meet the customer requirements.

Responsibilities
• Supervise and monitor the quality of services provided.
• Recruit, select, train, assign, schedule, coach, counsel staff.
• Communicate job expectations; planning, monitoring, appraising and reviewing job contributions.
• Act as liaison between the Security Operations team, the SOC Manager and the customer’s technical management staff (as directed).
• Assist in the preparation and completion of security action plans; implement production, productivity, quality and customer-service standards; resolve problems; complete audits; identify trends.
• Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
• Perform cyber defense trend analysis and reporting.
• Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
• Provide daily summary reports of network events and activity relevant to cyber defense practices.
• Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings).
• Review and approve procedures and work instructions for use by the SOC staff (Tier 1 through Tier 3).
• Train and mentor the Tier 3 analysts and engineers as needed.
• Provide cybersecurity recommendations to leadership based on significant threats and vulnerabilities.
• Inform senior management about performance and issues, including escalations.
• Monitor and manage customer SLA compliance for SOC.
• Monitor documentation to ensure accuracy and quality.
• Establish professional development programs with Training Coordinator for personnel.
• Monitor security-related trends, perform self-development activities, and maintain professional certifications.
• Complete all security training required by client and all customers

Qualifying Experience and Attributes
• Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
• Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute).
• Knowledge of computer networking concepts and protocols, and network security methodologies.
• Knowledge of cybersecurity and privacy principles.
• Knowledge of cyber threats and vulnerabilities.
• Knowledge of encryption algorithms, cryptography, and cryptographic key management concepts.
• Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).
• Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).
• Knowledge of incident response and handling methodologies.
• Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
• Knowledge of network traffic analysis methods.
• Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
• Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
• Knowledge of key concepts in security management (e.g., Release Management, Patch Management).
• Knowledge of security system design tools, methods, and techniques.
• Knowledge of Virtual Private Network (VPN) security.
• Knowledge of what constitutes a network attack and its relationship to both threats and vulnerabilities.
• Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations.
• Knowledge of adversarial tactics, techniques, and procedures.
• Knowledge of network tools (e.g., ping, traceroute, nslookup)
• Knowledge of defense-in-depth principles and network security architecture.
• Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN).
• Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip).
• Knowledge of interpreted and compiled computer languages.
• Knowledge of cyber defense and information security policies, procedures, and regulations.
• Knowledge of the common attack vectors on the network layer.
• Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
• Knowledge of cyber attackers (e.g., script kiddies, insider threat, nation/non-nation state sponsored).
• Knowledge of system administration, network, and operating system hardening techniques.
• Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
• Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
• Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
• Signature implementation impact for viruses, malware, and attacks.
• Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).
• Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications.
• Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
• Knowledge of how to use network analysis tools to identify vulnerabilities.
• Knowledge of penetration testing principles, tools, and techniques.
• Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort).
• Skill in using protocol analyzers.
• Skill in collecting data from a variety of cyber defense resources.
• Skill in recognizing and categorizing types of vulnerabilities and associated attacks.
• Skill in reading and interpreting signatures (e.g., snort).
• Skill in performing packet-level analysis.
• US Citizen and must be able to pass background check(s)



  • Austin, United States arm limited Full time

    The Role Job Overview Our Systems Development team designs subsystems for various application segments, using the latest IP products from Arm and other vendors. We are looking for a creative and hardworking SoC Verification Engineer to join the team and help develop these systems. As a SoC Verification Engineer you will contribute to the...


  • Austin, TX, United States PER International Full time

    About the Company:Our Client is one of the world’s largest global Top-tier Semiconductor Company. Their chips are used by some of the biggest names in the tech industry, and they are helping to shape the future of technology - thus, making them a major force in the semiconductor industry.About the Role:This is a leadership role in our system-on-chip...

  • Security Analyst

    2 months ago


    Austin, United States TEKsystems Full time

    Job DescriptionJob DescriptionTop Skills' DetailsStrong knowledge of SEIM/Security Suite knowledge preferred, they are using AZURE Sentinel so someone had this experience that would be a huge plusExperience with SEIM ES configuration, tuning and incident investigationExperience with log ingestion into the SEIM by raw log ingestion, email, and API.Create...


  • Austin, United States Resilient Healthcare & Home Health Full time

    Post-Acute Rehab Solutions is looking for a committed Physical Therapist Area Manager Responsibilities Maintain a Full coverage of area. Area manager will accept patient overflow to ensure 100% of visits are covered. Manage/Oversee PT, OT, PTA, COTA, ST and MSW staff in managed area. Documentation training SOC training/Review of SOC paperwork for...


  • Austin, United States Synopsys Full time

    We Are:At Synopsys, we drive the innovations that shape the way we live and connect. Our technology is central to the Era of Pervasive Intelligence, from self-driving cars to learning machines. We lead in chip design, verification, and IP integration, empowering the creation of high-performance silicon chips and software content. Join us to transform...


  • Austin, United States Cadence Design Systems, Inc. Full time

    At Cadence, we hire and develop leaders and innovators who want to make an impact on the world of technology. Work closely with customer to address, track, and facilitate discussions on an expansive list of open issues, topics and initiatives, track Objectives and key results (OKR), Key Performance Indicators (KPI) and other metrics over time. ...


  • Austin, United States Synopsys Full time

    We Are: At Synopsys, we drive the innovations that shape the way we live and connect. Our technology is central to the Era of Pervasive Intelligence, from self-driving cars to learning machines. We lead in chip design, verification, and IP integration, empowering the creation of high-performance silicon chips and software content. Join us to transform the...


  • Austin, United States Synopsys Full time

    We Are: At Synopsys, we drive the innovations that shape the way we live and connect. Our technology is central to the Era of Pervasive Intelligence, from self-driving cars to learning machines. We lead in chip design, verification, and IP integration, empowering the creation of high-performance silicon chips and software content. Join us to transform the...


  • Austin, United States Randstad Full time

    job summary: Our client in the Austin area is looking to hire a Third Party Vendor Risk Management Consultant for a 12 month contract. They are a large client in the Retail Industry that is looking for someone to join their team as soon as possible. The Ideal Candidate will have: Must have 5+ years in IT Security in security for 5+ years.Must have 3+ years...


  • Austin, Texas, United States Diverse Lynx Full time

    Job SummaryAs an IT SOX Compliance Risk Manager at Diverse Lynx LLC, you will be responsible for maintaining the IT Risk Control Matrix, performing SOX IT General Controls (ITGC) and Information Security compliance controls across all divisions and technology platforms, including SAP.Manage timely performance of control assessments and review of control...


  • Austin, United States Randstad Full time

    job summary: Our client in the Austin area is looking to hire a Third Party Vendor Risk Management Consultant for a 12 month contract. They are a large client in the Retail Industry that is looking for someone to join their team as soon as possible. The Ideal Candidate will have: Must have 5+ years in IT Security in security for 5+ years. Must have 3+...


  • Austin, Texas, United States Cadence Design Systems, Inc. Full time

    Cadence Design Systems, Inc. is seeking an experienced RTL Design Architect to contribute to the development of next-generation SoCs targeting Hyper-Scalar, Automotive, IoT, and Mil-Aero markets.The ideal candidate will have a strong background in RTL design, with expertise in Verilog and experience with synthesis, SDC creation, and physical design. They...

  • IT Auditor

    4 weeks ago


    Austin, United States Diverse Lynx Full time

    Role Description: Job responsibilities include but not limited to, • Manage timely performance of control assessments, review of control supporting evidence as second line of defense • Actively assist in annual IT Risk Assessment including the following: identification of all systems supporting key financial processes; assessment of controls (general and...


  • Austin, United States Technology Navigators Full time

    This is an exclusive, off-market opportunity. Our client searches are confidential.* Apply now to learn more about this unique new position! Job Title: Senior FPGA EngineerLocation: Onsite in Southwest Austin, M – FJob Summary: A technology-driven company in Southwest Austin is seeking a Senior FPGA Engineer to design and develop high-performance embedded...


  • austin, United States Technology Navigators Full time

    This is an exclusive, off-market opportunity. Our client searches are confidential.* Apply now to learn more about this unique new position! Job Title: Senior FPGA EngineerLocation: Onsite in Southwest Austin, M – FJob Summary: A technology-driven company in Southwest Austin is seeking a Senior FPGA Engineer to design and develop high-performance embedded...


  • Austin, Texas, United States AssuredPartners Full time

    Job Title: Manager of Retirement AdministrationOverview:AssuredPartners is seeking a highly skilled Manager of Retirement Administration to join our team. This role is responsible for driving exceptional administrative support for clients' retirement offerings, including account management, team member management, and sales process implementation. The...


  • Austin, United States Renesas Electronics Full time

    Job Description The Infrastructure Digital Power Applications team is seeking a Sr Staff Validation Engineer who is excited about working on cutting edge power solutions for server and infrastructure processor/SOC applications. You will be leading the validation efforts in the development of pace-setting digital multiphase DC-DC power converter products...

  • AWS Cloud Engineer

    1 month ago


    Austin, United States LightEdge Solutions Full time

    LightEdge Solutions is developing the IT solutions that will propel businesses forward over the next 10 years. Using a combination of shared and private/dedicated platforms, LightEdge has been successful in offering businesses alternatives that streamline operations, improve reliability and reduce costs. If you are passionate about creating real solutions...


  • Austin, United States Cadence Design Systems, Inc. Full time

    At Cadence, we hire and develop leaders and innovators who want to make an impact on the world of technology. Cadence Solutions (North America) team is looking for an experienced RTL designer to contribute to architecture and design for next generation SoCs targeting Hyper-Scalar, Automotive, IoT and Mil-Aero markets. Please note, USA-Citizenship...


  • Austin, United States Advanced Micro Devices , Inc. Full time

    Overview: WHAT YOU DO AT AMD CHANGES EVERYTHING We care deeply about transforming lives with AMD technology to enrich our industry, our communities, and the world. Our mission is to build great products that accelerate next-generation computing experiences the building blocks for the data center, artificial intelligence, PCs, gaming and embedded....