Supervise U.S. SOC personnel, ensuring professional development, clear performance expectations, and operational excellence.
Promote a culture of accountability, continuous learning, and customer-first thinking across all SOC functions.
Lead efforts to attract, retain, and grow SOC talent, fostering a high-performing and collaborative regional team.
Develop and maintain U.S. SOC staffing and coverage models, ensuring consistency, quality, and responsiveness to customer alerts and incidents.
Drive effective delivery of all SOC services and continuous improvement of operational procedures, informed by metrics and data-driven insights.
Oversee escalation and incident management for the region, training leads and analysts to handle high-impact events and executive communications effectively.
Contribute to the SOC’s tooling and automation roadmap, clarifying requirements, supporting integrations, and collaborating with global engineering counterparts.
Stay actively involved in analyst training, solution validation, and process optimization to enhance detection and response capabilities.
Represent the SOC in cross-functional initiatives, customer interactions, and leadership discussions where technical and operational alignment is critical.
Requirements
****Qualifications*****Minimum Qualifications***
Experience in Cybersecurity, Information Systems, or a related technical field focused on security operations or incident response.
2+ years managing a SOC or multi-team security monitoring environment.
Strong technical understanding of operating systems, network defense, and incident response.
Excellent written and verbal communication skills with both technical and executive stakeholders.
*Preferred Qualifications***
5+ years of experience as a SOC or incident response analyst.
MSSP or MDR experience strongly preferred.
Familiarity with EDR (SentinelOne, CrowdStrike, Microsoft Defender) and SIEM/SOAR tools (Splunk, QRadar, Sumo Logic).
Understanding of automation, orchestration, and AI/ML in SOC operations.
Relevant certifications such as CISSP, CISM, GCIH, or equivalent.
Experience with cloud security monitoring (AWS, Azure, GCP).
Benefits
**Comprehensive Benefits Package Includes:**
Medical, Dental and Vision Insurance
401(k) Plan with Company Match
Tuition Assistance Program
Generous PTO after first 90 days
Company match to Employee Charitable contributions
Additional Voluntary benefits
Plus other Perks to support your well-being
Including Hybrid Work environment for roles based in Austin, Texas
Director leading security operations and enhancing vulnerability management at IDEXX. Driving strategic execution and operational excellence across key domains in cybersecurity.
IT Security Operations Specialist ensuring security of global networks, systems, and data. Implementing security controls and performing advanced threat hunting using Microsoft Sentinel and Darktrace.
Staff SOC Analyst driving advanced threat detection and incident response for Sunrun's security team. Leading complex investigations, mentoring analysts, and improving detection capabilities in a remote setup.
GSOC Analyst monitoring global events and managing critical incidents for Netflix's security operations. Ensuring timely communication and assessment during major security threats.
GSOC Analyst focusing on critical events and risk management operations at Netflix. Monitoring global threats and coordinating incident management efforts in a hybrid work setting.
Security Operations Center Engineer enhancing security posture via automation and threat hunting. Requires strong experience with SIEM and SOAR platforms and Python scripting.
Security Operations Vulnerability Analyst II identifying and mitigating security vulnerabilities. Collaborating with teams to ensure timely risk remediation and protection of enterprise systems.
Cyber Defender (SOC Analyst) acts as the key point of contact for major security incidents. Coordinating response efforts and enhancing procedures at a leading AI - powered security partner.
Junior SOC Analyst at Core Specialty responsible for monitoring and triaging security alerts across IT environment. This role offers hands - on experience in cybersecurity with a fast - paced operational environment.
Security Operations Coordinator overseeing security strategies and managing operations for public safety in NSW. Collaborating with law enforcement and enhancing transport system resilience with flexible work options.