Cyber Operations Manager- Threat Operations | Remote, USA

9 Minutes ago • 12 Years +
Cyber Security

Job Description

The Cyber Operations Manager for Threat Detection, Response, and Security Engineering leads a 24x7 team to ensure early and accurate detection, response, and containment of client threats. This role involves overseeing Security Engineering activities including SIEM, SOAR, PAM, IDAM, and Vulnerability management. The manager will mentor staff, drive continuous improvement in security operations, and collaborate with customers on reporting and escalations, leveraging deep expertise in security technologies.
Must Have:
  • Lead 24x7 Threat Detection and Response Analysts, providing operational and strategic planning.
  • Work closely with customers on reporting, stewardship calls, and escalations.
  • Enforce all policies and procedures, including security, disaster recovery, standards, and service provision.
  • Drive continuous refinement and improvement of detection and response and incident response processes.
  • Oversee the security of Client systems via Advanced Fusion Center (AFC) service.
  • Keep current with the latest vendor updates, expansion opportunities, and technology directions.
  • Collaborate and consult with other Managers on the overall advancement of the Security Operations organization.
  • Direct and drive process and documentation improvement.
  • Manage staffing, including recruitment, supervision, scheduling, development, evaluation, and disciplinary actions.
  • Develop and maintain an educational environment for the group.
  • Perform staff performance appraisals.
  • Ensure timely reporting of security control gaps and vulnerabilities to the customer.
  • Prepare reporting of metrics and trending of SLA & KPIs to the customer and client support staff.
  • Stay abreast of evolving risks, new developments in the security industry, and best practices.
  • Attend info security-related events and network with industry peers.
  • Oversee team’s production of threat intelligence reports.
  • Responsible for normalizing data from vulnerability assessment, penetration test, incident response, and application security project deliverables.
  • Establish and maintain regular written and in-person communications with executives and other group heads.
  • Develop and mentor staff through open communication, training, and performance management.
  • 12+ years professional IT and Information Security experience.
  • 5+ years leading technical Threat Detection and Response teams.
  • 5+ years professional experience in cyber operations centers.
  • 3+ years professional experience in managed services.
  • One or more certifications in Security/Networking (Security+, GSEC, GCIA, GCIH, CISSP, CISM, CISA, or other security-specific vendors/product certifications).
  • Proven ability to make decisions and perform complex problem-solving activities under pressure.
  • Advanced business acumen.
  • Sharp analytical abilities and ability to make sound decisions quickly.
  • Deep understanding of SIEM vendors, solutions, and architecture (LogRhythm, QRadar, Splunk, Exabeam, etc.).
  • Deep understanding of EDR vendors, solutions, and architecture (Crowdstrike, Cylance, Carbon Black, Microsoft ATP).
  • Deep understanding of regulatory compliance (NIST, SOX, HIPPA, NERC CIP, PCI) and their differentiators.
  • Deep understanding of laws pertaining to cybersecurity and their differentiators across global regions.
  • Understanding of Security Orchestration, Automation, and Response concepts.
  • Experience working with ticketing and knowledge management systems such as Service Now.
  • Experience with ITIL concepts and practices.
  • Experience with security analytics platforms such as Kibana.
Perks:
  • A company committed to championing Diversity, Equality, and Inclusion through Employee Resource Groups.
  • Work/life balance.
  • Professional training resources.
  • Creative problem-solving and the ability to tackle unique, complex projects.
  • Volunteer Opportunities (Optiv Chips In).
  • The ability and technology necessary to productively work remotely/from home (where applicable).

Add these skills to join the top 1% applicants for this job

team-management
risk-management
risk-mitigation
talent-acquisition
game-texts
networking
incident-response
threat-intelligence
kibana
splunk

The Cyber Operations Manager over Threat Detection, Response and Security Engineering is responsible for ensuring early and accurate detection, response, and containment for threats directed against our clients. The position includes oversight on Security Engineering activities that may include SIEM, SOAR, PAM, IDAM and Vulnerability management. As a technical management role, the ideal candidate possesses security knowledge/expertise in multiple technologies (SIEM, and PAM required) . The position is closely involved in helping to mentor, develop and evaluate employee performance as well as helping with the development and continuous improvement of the Security Operations services.

How you'll make an impact

  • Lead 24x7 Threat Detection and Response Analysts providing operational and strategic planning, including fostering innovation, planning projects, and organizing and negotiating the allocation of resources as well managing the day-to-day operations.
  • Work closely with customers on reporting, stewardship calls, and in the case of escalations.
  • Enforce all policies and procedures, including those for security, disaster recovery, standards, and service provision.
  • Drive continuous refinement and improvement of detection and response and incident response processes.
  • Oversee the security of Client systems via Advanced Fusion Center (AFC) service.
  • Keep current with the latest vendor updates, expansion opportunities, and technology directions, utilized in the Clients environment.
  • Collaborate and consult with other Managers on the overall advancement of the Security Operations organization and Optiv in general.
  • Direct and drive process and documentation improvement.
  • Manage staffing, including recruitment, supervision, scheduling, development, evaluation, and disciplinary actions.
  • Develop and maintain an educational environment where the knowledge and performance of the group are constantly advancing.
  • Perform staff performance appraisals.
  • Ensure timely reporting of security control gaps and vulnerabilities to the customer.
  • Prepare reporting of metrics and trending of SLA & KPIs to the customer and client support staff.
  • Stay abreast of evolving risks, new developments in the security industry, and industry best practices in risk management, threat analysis, and threat response techniques.
  • Attend info security-related events and network with industry peers to inform engineering and operations processes of effective risk mitigation strategies for attacks.
  • Oversee team’s production of threat intelligence reports that communicate the results of the analyses to the respective audience.
  • Responsible for the joint team effort to normalize data from vulnerability assessment, penetration test, incident response, and application security project deliverables.
  • Establish and maintain regular written and in-person communications with the organization’s executives, other group heads regarding pertinent activities.
  • Develop and mentor staff through open communication, training and development opportunities, and performance management processes; build and maintain employee morale and motivation.
  • Supervisory Responsibilities: Cyber Operations Manager will report to the Director of Security Operations.

What we're hiring for

  • 12+ years professional IT and Information Security experience
  • 5+ years leading technical Threat Detection and Response teams
  • 5+ years professional experience in cyber operations centers
  • 3+ years professional experience in managed services
  • One or more certifications in Security/Networking including Security+, GSEC, GCIA, GCIH, CISSP, CISM, CISA, or other security-specific vendors/product certifications
  • Proven ability to make decisions and perform complex problem-solving activities under pressure. Advanced business acumen required.
  • Sharp analytical abilities and the ability to make sound decisions quickly are required.
  • Deep understanding of SIEM vendors, solutions, and architecture such as LogRhythm, QRadar, Splunk, Exabeam, etc.
  • Deep understanding of EDR vendors, solutions, and architecture such as Crowdstrike, Cylance, Carbon Black, Microsoft ATP.
  • Deep understanding of regulatory compliance such as NIST, SOX, HIPPA, NERC CIP, PCI, etc. and their differentiators across global regions
  • Deep understanding of laws pertaining to cybersecurity and their differentiators across global regions
  • Understanding of Security Orchestration, Automation, and Response concepts.
  • Experience working with ticketing and knowledge management systems such as Service Now.
  • Experience with ITIL concepts and practices.
  • Experience with security analytics platforms such as Kibana.

#LI-TW1

#LI-Remote

What you can expect from Optiv

  • A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups.
  • Work/life balance
  • Professional training resources
  • Creative problem-solving and the ability to tackle unique, complex projects
  • Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities.
  • The ability and technology necessary to productively work remotely/from home (where applicable)

Set alerts for more jobs like Cyber Operations Manager- Threat Operations | Remote, USA
Set alerts for new jobs by Optiv
Set alerts for new Cyber Security jobs in United States
Set alerts for new jobs in United States
Set alerts for Cyber Security (Remote) jobs

Contact Us
hello@outscal.com
Made in INDIA 💛💙