Cyber Operations Lead ensuring coordination of cyber operations between the Security Operations Center and internal business units. Enhancing security through effective incident response and threat management initiatives.
Responsibilities
Leading coordination efforts between the SOC and internal business units to ensure timely communication of security events, incidents, and operational priorities
Managing internal cyber operations initiatives, including threat hunting activities, security monitoring enhancements, and defensive countermeasure implementations
Serving as the primary point of contact for escalated security incidents requiring cross-functional coordination and executive communication
Translating technical SOC findings and threat intelligence into executive-level briefings and actionable recommendations for business stakeholders
Coordinating incident response activities across multiple teams, ensuring proper documentation, communication, and lessons learned processes
Developing and maintaining operational playbooks, standard operating procedures, and communication protocols between the SOC and internal teams
Facilitating regular operational meetings to review security metrics, incident trends, threat landscape updates, and operational improvements
Collaborating with IT operations, infrastructure teams, and business units to ensure security requirements are integrated into operational processes
Managing the lifecycle of security events from detection through resolution, ensuring proper stakeholder engagement and documentation
Contributing to the continuous improvement of SOC capabilities through feedback loops, process optimization, and technology recommendations
Remaining informed on trends and issues in the security operations industry, including current and emerging threats, tools, and best practices
Requirements
Bachelor's degree in Cybersecurity, Computer Science, Information Systems or equivalent field of study, or equivalent experience is required
A minimum of (7) years of relevant experience in cybersecurity operations, incident response, or SOC environments is required
Demonstrated experience working directly with or within a Security Operations Center
Strong understanding of security operations workflows, including event triage, incident response, and threat intelligence integration
Experience coordinating cross-functional teams during security incidents and operational initiatives
Excellent communication skills with the ability to translate technical security concepts for non-technical audiences
Experience with security information and event management (SIEM) platforms and security orchestration tools
Knowledge of incident response frameworks (NIST CSF, SANS Incident Response, etc.)
Understanding of threat intelligence sources, indicators of compromise (IOCs), and threat actor tactics, techniques, and procedures (TTPs)
Ability to manage multiple priorities in a fast-paced operational environment
Strong analytical and problem-solving skills with attention to detail
Experience documenting operational processes, incident reports, and executive briefings
This position requires the ability to obtain and maintain Secret security clearance, which is issued by the U.S. government. U.S. citizenship is required to obtain a security clearance
Benefits
Comprehensive health care and wellness plans
Paid holidays, sick time, and vacation
Standard and alternate work schedules, including telework options
401(k) Plan — Employees receive a total company-paid benefit of 8%, 10%, or 12% of eligible compensation based on years of service and matching contributions; employees are immediately eligible and vested in the plan upon hire
Flexible spending accounts
Variable pay program for exceptional contributions
Relocation assistance
Professional growth and development programs to help advance your career
Education assistance programs
An inclusive work environment built on teamwork, flexibility, and respect
Solution Sales Manager enhancing revenue in financial services, focusing on ServiceNow IRM and Tanium solutions. Collaborating with teams and engaging C - level executives in Austria and Switzerland.
Senior Internal SOC Analyst leading security triage and investigations for Darktrace, utilizing AI - driven cybersecurity technology. Collaborating on incident response and mentorship within a hybrid work environment.
Security Operations Intern responsible for security monitoring at Paddy Power Betfair. Involves data loss prevention investigations and content filtering analysis with a commitment to improving security posture.
SOC Analyst L2 responsible for managing and analyzing security incidents in digital transformation. Contributing directly to the protection of companies and infrastructures.
Senior Manager leading global IT security operations to protect company data and assets at Keenova. Overseeing incident response, monitoring, and cybersecurity capabilities with strategic oversight.
Security Operations Center leader at Woven by Toyota, managing triage and response to security alerts in Japan. Collaborating with global SOCs to ensure 24/7 operations.
GSOC Analyst responsible for security operations at Paramount Studios. Developing workflows, incident response, and risk monitoring in a dynamic team environment.