Cybervance is looking for a skilled Cyber Security Operations Center Manager in Washington, D.C. to lead their SOC team and manage incident response, ensuring the safety of networks and data for a federal client.
Responsibilities: The SOC Manager will oversee incident response processes, coordinate with teams, develop security strategies, manage security technology, and ensure compliance with regulations.
Skills: Candidates must have 7-10 years of experience in SOC operations, incident response, and proficiency with cybersecurity tools like SIEM and EDR, as well as strong leadership and communication skills.
Qualifications: A bachelor's degree in computer science or information security is required, along with at least one relevant certification such as CISSP or CISM.
Location: This position is located on-site in Washington, D.C. with no travel requirements.
Compensation: Not provided by employer. Typical compensation ranges for this position are between $120,000 - $180,000.
Position Title: Cyber Security Operations Center Manager
Location: On Site - Washington, D.C.
Clearance Required: Top Secret
Cybervance is a rapidly growing information security and information technology company in Washington, D.C., and we are an equal opportunity employer that designs, develops, and manages the successful execution of training programs for government and private sector organizations. Cybervance believes in creating innovative solutions to deliver measured results.
Cybervance is seeking a highly skilled and experienced Cyber Security Operations Center (SOC) Manager to lead and manage our SOC team for a federal government client. The ideal candidate will oversee the monitoring, detection, and response to security incidents, ensuring the safety of the organization’s networks, systems, and data. As the SOC Manager, you will be responsible for developing and implementing security operations strategies, coordinating incident response activities, and leading a team of cybersecurity analysts. You will also be tasked with optimizing SOC processes, improving threat detection capabilities, and ensuring compliance with industry’s best practices and regulatory requirements.
Responsibilities:
• Overseeing the incident response process.
• Coordinating with other teams and stakeholders.
• Developing and maintaining incident response plans.
• Conducting post-incident reviews.
• Develops and implements security operations strategies and procedures in alignment with the organization's goals. This includes defining detection use cases and establishing escalation processes.
• Oversee the deployment, maintenance, and optimization of the security technology stack. Key tools include Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR), and Intrusion Detection/Prevention Systems (IDS/IPS).
• Acts as the primary point of contact for security incidents and reports on activities, performance metrics (like mean time to detect/resolve), and findings to senior leadership, such as the Chief Information Security Officer (CISO).
• Ensures the SOC uses up-to-date threat intelligence to enhance proactive threat hunting and detection capabilities.
• Develop and enforce security policies and procedures and ensure the SOC's operations meet compliance and regulatory requirements (e.g., NIST, FISMA for federal clients).
Required Skills and Experience:
• 7 to 10 years of experience in SOC operations and incident response, including prior leadership roles such as an incident commander.
• Proficiency in security operations, incident response, threat analysis, and cybersecurity tools such as EDR (Endpoint Detection and Response), SIEM (Security Information and Event Management), Intrusion Detection/Prevention Systems (IDS/IPS), and Log Analysis for both on-premises and cloud-based environments.
• Experience leading a team, managing projects, and providing technical guidance to junior team members is crucial.
• Deep understanding of cybersecurity principles, SOC operations, and incident response techniques.
• Ability to articulate technical concepts clearly to both technical and non-technical audiences.
• Strong analytical and problem-solving skills to handle security incidents and vulnerabilities.
• Ability to work effectively with other IT teams, stakeholders, and external partners.
• In-depth knowledge of cybersecurity principles and advanced security tools (SIEM, EDR, IDS/IPS, etc.) is essential. Experience with cloud-based environments is also often required.
• Strong experience in leading and managing technical teams, providing technical guidance, and overseeing projects is crucial.
• The ability to clearly and effectively communicate technical concepts to both technical and non-technical audiences is necessary for reporting and coordinating with stakeholders.
• Exceptional analytical and problem-solving skills are needed to investigate complex security incidents.
• Essential soft skills include decision-making under pressure, collaboration, strategic thinking, and emotional intelligence for managing team dynamics.
• Strategic Thinking: Ability to develop and implement strategic initiatives to enhance the effectiveness of SOC operations.
• Ability to make quick decisions under pressure.
Education and Certifications: A bachelor’s degree in computer science, information security, cybersecurity, or a related field; or a master’s degree in cybersecurity, information security, or a related field, can be beneficial and may enhance your qualifications. All the following certifications are desired, but one of the following certifications is required:
• CISSP (Certified Information Systems Security Professional): Emphasizes technical and managerial knowledge and experience in designing, engineering, and managing an organization's overall security posture across a broad spectrum of cybersecurity domains.
• GIAC Certified Incident Handler (GCIH): Focuses on incident handling and response • Certified Information Security Manager (CISM): Emphasizes management and governance of information security.
• Certified SOC Analyst (CSA): Specifically designed for SOC roles.
If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.
Lead Cybervance's enterprise privacy and CUI program in Washington, D.C., ensuring compliance with federal privacy laws and overseeing CUI lifecycle management across the organization.
Cybervance seeks an experienced Cybersecurity Operations Technical Manager (SOC Engineer/SME) to lead SOC engineering, manage dispersed teams, and enhance security operations for a Washington, D.C. mission environment.
Peerspace is hiring a hands-on Head of Security and Technical Operations to lead SecOps and Technical Operations, act as Incident Commander, and drive platform security and reliability for a remote-first SaaS marketplace.
Resultant is hiring a remote Service Delivery Manager to improve client service delivery, manage SLAs and COBIT reporting, and coordinate technical and vendor teams to drive measurable IT outcomes.
Strategic Education seeks a hands-on Desktop Support Analyst Associate to deliver phone, email, remote, and onsite technical support and hardware provisioning for Minneapolis-area users.
Lead the modernization and day-to-day management of Oberlin's enterprise applications and a team of IT analysts to support a cloud-based ERP and campus-wide digital transformation.
Cybervance seeks an experienced Cybersecurity Operations Technical Manager (SOC Engineer/SME) to lead SOC engineering, manage dispersed teams, and enhance security operations for a Washington, D.C. mission environment.
Skyward seeks an IT Services Intern to provide database/server troubleshooting, basic network and remote support, and assistance with IT and sales-related projects while learning core IT operations.
Senior Database Administrator needed to lead the design and operation of enterprise databases across cloud and hybrid environments for a mission-driven nonprofit university.
Experienced security engineer needed to lead enterprise security infrastructure, incident response, and application security efforts for a mission-driven nonprofit operating in a hybrid work model.
Lead enterprise application administration and Ellucian Banner implementations at Mercy College to optimize administrative systems and support institutional stakeholders.
Lead and strengthen DoD-focused information assurance and RMF activities as a senior Information Security Specialist supporting mission-critical systems in Clarksburg, WV.
The University of Tennessee, Knoxville is hiring an Executive Director of Research Computing to lead the campus research computing cluster, drive strategic HPC and cloud initiatives, and partner with faculty on high-impact computational research.
Drive NetSuite improvements and financial process automation at a fast-growing marketing technology company by acting as the subject matter expert for ERP configuration, integrations, and reporting.
Getty is hiring an experienced Chief Information Security Officer to lead enterprise security, risk management, and incident response for the organization.