Finding the best job has never been easier
Share
Regular or Temporary:
English (Required)
The SOC Manager (3rd Shift) ensures that the SOC team has proper processes, resources, and tools to timely detect, analyze and respond to security incidents. Sets and execute a clear strategy for a SOC that includes items such as log collection, detection approach, detection practices, and security incident practices. Establish a clear security incident process and protocol; ensuring that the team understand what needs to be done to handle uncertain security issues.Serves as an escalation point and contact for security incidents, and a liaison between the other internal stakeholders. Establish a threat intelligence function leveraging tactical and strategic intelligence.This role is on-site in Zebulon, NC and will participate in an on-call rotation with the following shift options:3rd Shift, Monday to Friday 11pm to 7am
ESSENTIAL DUTIES AND RESPONSIBILITIES
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
Develop and maintain the technical IT/cyber capabilities including all phases of the software development lifecycle and software stack which includes threat modeling of application designs, static application security testing (SAST), software composition analysis (SCA), dynamic application security testing (DAST), and penetration testing.
Lead efforts related to designing, planning, enhancing, and testing all cybersecurity technologies used throughout the enterprise including base-lining current systems, trend analysis, and capacity planning as required for future systems requirements and new technologies.
Analyze information to determine, recommend, and plan the use of new information security technologies, or modifications to existing equipment and systems that will provide capability for proposed project or work load, efficient operation and effective use of allotted resources.
Lead the implementation of new information security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff.
Use sophisticated analytical thought through models, testing, and experience to exercise judgment and identify innovative solutions.
Responsible for technical support of information security technologies providing expert problem analysis and resolution in a timely manner.
Set the team's direction and communicates individual and team priorities and deliverables for the team against expected results.
Make leadership decisions within established policies, procedures, and established objectives.
Leads complex and visible projects with moderate to high risk and complexity.
Required Qualifications:
The requirements listed below are representative of the knowledge, skill and/or ability
Preferred Qualifications:
Seven (7) or more years of cybersecurity experience in a technical role
Five (5) or more years’ working experience in atechnologyenvironment with exposure to information security principles.
Abachelor’s degree in Information Security, Information Technology, Computer Science, Engineering, or similar field.
Extensive working knowledge of common IT and security concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques, cyber incident response, malware analysis, computer forensics and the tools that support these processes.
Display a working knowledge of at leastonethe following technologies: SIEM,EndPointDetection & Response tools, and Digital forensic suites.
Ability to solve complex problems by applying best practices. Demonstratedproficiencyutilizingsecurity platforms related to logging, event correlation, incident management, vulnerability management, and/or computer forensics.
Demonstrated teamwork and collaboration skills.
Strong time management skills and ability to manage competing priorities effectively.
Highly effective verbal and written communication skills for the purpose of providing extensive information about event timelines, technical designs, system concepts and business impact to audiences at all levels within the organization.
Highly effective verbal and written communication skills for the purpose of providing extensive information about event timelines, technical designs, system concepts and business impact to audiences at all levels within the organization.
Experience leading incidents as the primary technical voice
Experience working with DDoS attacks and other network-based attack types
Extensive working knowledge of Digital Forensics & Incident Response (DFIR) skills, includinglog, network, endpoint, memory, malware,reverse engineering,and root cause analysis.
Although, notrequired, a background in software development and/or scripting is highly desirable.
Three or more of the following (or similar) certifications: Security+, Network+,CySA+, GSEC, CEH, CHFI, GCIA, GCIH, GCFE, GCFA, GCED, GREM, OSCP.
Support a variety of tasks in support of the larger Cybersecurity Mission
Demonstrate the ability to work as a self-starter andacquirenew skills quickly
Exemplify the characteristics ofa great teamplayer and overall positive mindset
Ability to support an on-call and regular shift within a 24/7 operations environment.
Ability to obtain requisite technical certification(s) within six months of hire.
Visual / Audio / Speaking
Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.
Manual Dexterity / Keyboarding
Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.
Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need
These jobs might be a good fit