Cybersecurity Operations Manager

Mountain America Credit UnionSandy, UT
4dHybrid

About The Position

The Manager of Cybersecurity Operations is responsible for overseeing the security tools at MACU. This role balances hands‑on technical work with people‑management responsibilities, driving operational excellence, process maturity, and continuous improvement across the organization’s security monitoring and response capabilities.

Requirements

  • 4+ years of progressive experience in cybersecurity, with a strong foundation in security operations and team leadership.
  • Minimum 1 year as a technical lead of a team or direct manager experience over a team.
  • Skilled in managing and mentoring security engineers, administrators, and analysts to foster high-performing teams and drive operational excellence.
  • Experienced in aligning cybersecurity operational tasks with organizational goals, while demonstrating deep expertise in secure infrastructure engineering, incident response, and threat detection.
  • Proven success in implementing and operationalizing cybersecurity frameworks to protect complex enterprise environments.
  • Bachelor's degree or equivalent experience
  • Strong knowledge of security operations, incident response, and threat detection.
  • Experience with security tools and platforms (SIEM, EDR, firewalls, cloud security, etc.).
  • Leadership and team management skill demonstrated in leading Cybersecurity practices.
  • Strong analytical and problem-solving skills applied to identifying vulnerabilities, analyzing threat intelligence, and developing effective cybersecurity solutions to mitigate risk and enhance organizational resilience.
  • Excellent verbal and written communication skills, with the ability to clearly convey complex cybersecurity concepts, incident reports, and risk assessments to both technical and non-technical audiences.
  • Demonstrated ability to collaborate with cross-functional teams—including IT, legal, compliance, and executive leadership—to align cybersecurity initiatives with business objectives, coordinate incident response efforts, and drive enterprise-wide security operations.
  • Creates a sense of urgency and accountability in delivering objectives.
  • Coaches and develops team members to reach their full potential.
  • Leads work effectively and regularly across functions.
  • Responsible for the effectiveness of the team and performance results.
  • Oversees day-to-day operations of the Security Operations Center (SOC), ensuring timely detection, analysis, and response to cybersecurity incidents.
  • Leads the execution of security operations processes with Incident Response leadership —including threat monitoring, incident response, and vulnerability management—while aligning with cybersecurity leadership priorities and compliance requirements.
  • Directs and evaluates the performance of security analysts and engineers, fostering a high-performing team culture focused on continuous improvement and operational excellence.
  • Independently manages SOC workflows, escalations, and tooling decisions to maintain optimal security posture and incident readiness.
  • Anticipates and mitigates security threats and operational risks through proactive monitoring, threat hunting, and coordination with IT and business units.
  • Establishes clear goals for security operations initiatives, including incident response metrics, threat detection improvements, and automation of repetitive tasks.
  • Implements security controls and operational enhancements that measurably reduce risk, improve response times, and support business continuity.
  • Contributes operational insights to cybersecurity strategy, including recommendations for tooling, staffing, and process improvements.
  • Executes cybersecurity initiatives by balancing resource constraints with the need for rapid threat detection, response, and compliance adherence.
  • Focuses on short-term planning and execution of security operations priorities, ensuring agility in responding to evolving threats and business needs.
  • Leverages deep expertise in cybersecurity frameworks, threat intelligence, and advanced detection methodologies to design innovative solutions for complex security challenges, such as zero-day threat mitigation and automated incident response.
  • Combines seasoned judgment with real-time telemetry and threat data to anticipate attack vectors, prioritize alerts, and guide rapid decision-making during high-pressure security incidents.
  • Conducts in-depth analysis of security logs, threat intelligence feeds, and behavioral anomalies to uncover sophisticated threats and inform proactive defense strategies.
  • Implements tactical and operational security solutions—including SIEM tuning, playbook automation, and endpoint hardening—with a focus on measurable impact.
  • Ability to sit, talk and hear consistently
  • Close vision (clear vision at 20 inches or less)
  • Distance vision (clear vision at 20 feet or more)
  • Color vision (ability to identify and distinguish colors)
  • Ability to lift up to 10 pounds frequently and up to 25 pounds occasionally

Nice To Haves

  • CISSP, CISM, Security X (formerly CASP+), CEH or equivalent certifications preferred.

Responsibilities

  • Evaluate, implement, and maintain security monitoring solutions (SIEM, SOAR, EDR, UEBA, etc.).
  • Collaborate with IT, Risk, and Compliance teams to align security operations with organizational objectives.
  • Monitor and report on key security metrics and operational performance.
  • Support vulnerability management and threat intelligence initiatives.
  • Participate in post-incident reviews and drive continuous improvement.
  • Maintain awareness of current cybersecurity threats, vulnerabilities, and best practices.
  • Assist in the development and delivery of security awareness training.
  • Ensure compliance with regulatory requirements and internal security policies.
  • Contribute to the strategic planning and roadmap for cybersecurity operations.
  • Foster a culture of accountability, teamwork, and continuous learning within the security operations team.
  • Manage relationships with MSSPs, threat‑intel providers, and technology vendors, ensuring service levels are met.
  • Work closely with the engineering, network, and application teams to integrate security controls early in the development lifecycle.
  • Participate in tabletop exercises, red‑team/blue‑team simulations, and business continuity planning.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service