SOC Manager
Location: Onsite in the Phoenix, AZ area
Salary: Competitive Base + Options!
The SOC Manager will develop, lead, and grow a team of security analysts.
This role will be responsible for building out a training program, developing career plans, continue to advance our operational metrics and key performance indicators while maintaining high quality SOC capabilities.
As a technical manager, the candidate will be able to mentor a team of analysts on the investigation process and be the designated incident lead for major incidents.
Primary Duties:
Develop, lead, and grow a team of security analysts
Building, managing, and supporting the training programing to develop career plans
Mentor all analysts on the investigation process
Lead on any major incidents that may arise and be available for go to inquiries.
Experience Necessary
6+ years of experience in cyber security
2+ years of experience in the MSSP/vendor space
2+ years of experience in a SOC hands on leadership role
Ability to present to a technical audience and translate technical material to non-technical audiences along with turning it into actionable business objectives
Fundamental understanding of enterprise security and how the SOC has an impact and enables it
Experience managing, training, and mentoring a team of analysts
Able to remain calm and handle high stress situations in a fast-paced environment
Ensure efficient and cost-effective staffing and scheduling
Ability to manage an operational team which operates 24/7/365 and be in an on-call rotation
Data driven and highly analytical mindset
Highly organized and detailed oriented
Technical Capabilities/Experience:
Minimum of 4 years of experience performing triage/incident response in enterprise environments
Minimum of 4 years of experience performing forensic analysis of logs and packet captures to identify malicious artifacts
Higher level security certifications (CEH, GCIH, GCFA, GCFE, GCTI, GCIA, GREM, GPEN, GFNA, OCSP, CISSP, CISM)
Strong understanding of the MITRE ATT&CK Framework, common web attacks, NIST or SANS Incident Handling Procedures, knowledge of Windows and Linux operating systems, and networking principles
Strong understanding of incident response methodologies and reporting
Ability to analyze packet captures/data and logs to perform incident response and identify potential compromises to customer networks
Possesses a solid understanding of the TCP/IP protocol suite, security architecture, and common TTP’s (tactics, techniques, and procedures) used by threat actors
Experience analyzing both log and packet data in a SIEM (RSA NetWitness, Sentinel, Chronicle, etc.
)
Benefits Include:
Health Insurance 80% paid by employer
Dental Insurance 80% paid by employer
Vision Insurance 80% paid by employer
Short-term disability 100% paid by employer
Self-Managed vacation leave
Paid sick leave
Paid holiday leave
Lumifi Cyber welcomes and encourages diversity in our workplace.
All qualified applicants will receive consideration for employment without regard to race color, religion, sex, sexual orientation, gender identity, national origin or disability.
All candidates must be eligible to work in the U.
S.
for any employer.
Lumifi participates in E-Verify verification.
wVhTPNRJW2