SOC Manager

TENEX.AIOverland Park, KS
38dOnsite

About The Position

As the Security Operations Manager, you will oversee the daily operations of a Security Operations Center (SOC) for our evening SOC team. This includes leading and mentoring a team of security analysts, developing and implementing security policies and procedures, and ensuring the effective use of security tools and technologies. The SOC Manager is responsible for the detection, analysis, and response to security incidents, as well as proactive threat hunting and vulnerability management. Culture is one of the most important things at TENEX.AI—check out our culture deck at culture.tenex.ai to experience how we champion it, valuing the unmatched collaboration and community of in-person work while offering flexibility for the best of the best. The ideal candidate will be able to work onsite for the evening SOC support our Overland Park, KS (Kansas City Metro Area) location.

Requirements

  • Bachelor's degree in Computer Science, Information Security, or a related field
  • 5+ years of experience in information security, with at least 2 years in a leadership/mentorship or management role within a SOC.
  • Strong understanding of security principles, technologies, and best practices.
  • Experience with security frameworks (e.g., NIST, ISO 27001).
  • Proficiency with SIEM platforms (e.g., Splunk, QRadar, Sentinel) and other security tools.
  • Experience in incident response, threat hunting, and vulnerability management.
  • Excellent leadership, communication, and interpersonal skills.
  • Relevant security certifications (e.g., CISSP, CISM, GCIH, GCIA) are highly desirable.
  • Experience with security orchestration, automation, and response (SOAR) platforms.
  • Exposure to cloud security platforms (e.g., AWS, Azure, Google Cloud) and the associated risks.
  • Practical experience working with Google SecOps tools and Chronicle for centralized threat intelligence and event correlation a plus.
  • Hands-on experience with the Microsoft security platform (Sentinel, Defender) is a plus.

Nice To Haves

  • Relevant security certifications (e.g., CISSP, CISM, GCIH, GCIA) are highly desirable.
  • Experience with security orchestration, automation, and response (SOAR) platforms.
  • Exposure to cloud security platforms (e.g., AWS, Azure, Google Cloud) and the associated risks.
  • Practical experience working with Google SecOps tools and Chronicle for centralized threat intelligence and event correlation a plus.
  • Hands-on experience with the Microsoft security platform (Sentinel, Defender) is a plus.

Responsibilities

  • Lead, mentor, and manage a team of SOC analysts, fostering a culture of continuous learning and improvement.
  • Contribute to active cases and other Security Operations Center requirements as directed by the Director of Security.
  • Develop, implement, and maintain SOC processes, procedures, and runbooks to ensure efficient and effective security operations.
  • Oversee the 24/7 monitoring, detection, and analysis of security events and incidents.
  • Manage and prioritize security incidents, ensuring timely and effective response, containment, and recovery.
  • Conduct regular threat intelligence analysis to identify emerging threats and vulnerabilities.
  • Implement and optimize security tools and technologies, including SIEM, EDR, IDS/IPS, and vulnerability scanners.
  • Develop and deliver regular reports on SOC performance, incident trends, and security posture.
  • Collaborate with other IT teams to ensure the integration of security into all aspects of the organization's infrastructure.
  • Stay up-to-date with the latest security trends, technologies, and best practices.
  • Manage and participate in on-call rotations as needed.

Benefits

  • Competitive salary and benefits package.
  • A culture of growth and development, with opportunities to expand your knowledge in AI, cybersecurity, and emerging technologies.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service