Vice President of Security Operations Center managing a global cyber defense strategy at Saviynt. Leading cybersecurity initiatives, incident response, and threat detection efforts.
Responsibilities
Lead and continuously mature a 24/7 global Security Operations Center (SOC) to detect, analyze, and respond to cyber threats in real time.
Refine the SOC operating model, coverage strategy, escalation paths, and incident command structure.
Serve as Incident Commander for incidents including global coverage. Direct overall IR activities.
Ensure high-fidelity alerting, reduced false positives, and measurable improvements in detection and response effectiveness (MTTD, MTTR).
Develop and execute a Threat Hunting strategy to proactively identify advanced, stealthy, and persistent threats before escalation.
Drive adversary-focused detection aligned to MITRE ATT&CK and D3FEND, threat intelligence, and real-world attack patterns.
Establish and maintain IR playbooks, runbooks, escalation procedures, and cross-functional coordination with IT, Legal, Communications, Risk, and Compliance.
Lead forensic investigations, root cause analysis, and post-incident reviews to strengthen controls and prevent recurrence.
Lead tabletop exercises, red/purple team engagements, and breach simulations to test readiness.
Oversee Attack Surface Management (ASM) to continuously identify, monitor, and reduce external and internal exposure across cloud, SaaS, identity, endpoints, and networks.
Oversee Dark Web Monitoring initiatives to detect leaked credentials, data exposure, insider threats, and early indicators of compromise.
Collaborate closely with Threat Intelligence teams to track adversary TTPs, emerging threats, and sector-specific risks, translating intelligence into actionable detections and controls.
Develop and execute a comprehensive Cyber Defense strategy, aligning security operations with business objectives, risk appetite, and regulatory requirements.
Own the SOC technology stack, including SIEM, SOAR, EDR/XDR, CNAPP, cloud security tooling, case management, and forensic platforms.
Drive automation and orchestration to reduce manual effort and scale SOC operations efficiently.
Manage, mentor, and grow high-performing teams across SOC, Threat Hunting, Incident Response, and Threat Intelligence functions.
Establish career paths, training programs, and succession planning for security operations talent.
Partner with Product, Engineering, Infrastructure, Legal and HR teams to ensure alignment with security frameworks and regulatory obligations.
Present clear, business-aligned cyber risk metrics, threat trends, and program updates to executive leadership and the board.
Requirements
Bachelor’s or master’s degree in computer science, Information Security, or a related field. Or equivalent work experience with demonstrated results.
15+ years of experience leading cybersecurity teams across SOC, Threat Hunting, Incident Response, Attack Surface Management, Dark Web Monitoring and Threat Intelligence.
Proven executive leadership and crisis management experience handling major security incidents and board-level communications.
Deep expertise in MITRE ATT&CK, threat intelligence frameworks, adversary emulation, and digital forensics.
Strong hands-on and architectural understanding of SIEM, SOAR, EDR/XDR, and cloud security technologies (AWS, Azure, GCP).
Experience designing and executing cyber defense strategies in large-scale, complex enterprise environments.
Solid knowledge of offensive security techniques and attacker methodologies, with the ability to translate them into effective defensive strategies
Certifications - CISSP, CISM, CCSP, or equivalent are nice to have but not a requirement
Vice President of Security Operations Center at Fidelity ensuring security across global operations. Leading cyber incident response and collaborating with internal teams to enhance network security.
Security Operations Manager overseeing client relations and service delivery across multiple Columbus sites. Ensuring operations meet client expectations while managing staffing and scheduling responsibilities.
Security Operations Manager overseeing client relations and service delivery across Columbus sites for Ohio Support Services. Ensuring client security expectations and company standards are met or exceeded.
SOC Analyst responsible for monitoring global threats and preventing cyber attacks for SHE. Collaborating with elite teams and documenting activities in Ludwigshafen.
Information Security Senior Director leading cybersecurity operations strategies at Mass General Brigham. Managing teams, budget, and cross - functional collaborations for security and compliance.
Senior Security Engineer on FINRA's Security Operations team implementing and maintaining security solutions. Collaborate with teams to enhance security and mentor junior staff.
Security Operations Engineer supporting federal cybersecurity initiatives across enterprise and cloud environments. Hands - on security engineering, operational monitoring, and compliance support.
Security Operations Lead at Aily Labs designing AI - native security operations solutions. Collaborating with engineers to build innovative security capabilities at scale.
SOC Analyst enhancing cybersecurity operations for a global security team based in Manila, Philippines. Responsible for incident response, threat analysis, and process improvement.