eSOC Manager overseeing cybersecurity operations for HII’s Security Operations Center. Leading incident response and managing SOC analysts in protecting corporate and U.S. Government information.
Responsibilities
Designs, tests, and implements state-of-the-art secure operating systems, networks, and database products
Conducts risk assessment and provides recommendations for application design
Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access
Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research
May prepare security reports to regulatory agencies
The eSOC Manager leads and matures the company’s enterprise-wide Security Operations Center (SOC), providing centralized monitoring, detection, and incident response across the enterprise and its three divisional networks — including one that contains U-NNPI data regulated under NAVSEA 08 controls
The position oversees cybersecurity operations for on-premises and hybrid cloud environments (including O365, Azure, and AWS) and ensures continuous (24x7x365) coverage and protection of corporate and U.S. Government information
This role requires balancing technical depth, operational leadership, and compliance rigor under DFARS 252.204-7012, CMMC 2.0, and NIST SP 800-171/800-53 frameworks
The SOC Manager will direct the strategy of day-to-day security operations and cybersecurity engineering and appliance support efforts, coordinate enterprise incident response, manage SOC analysts and support engineers, and continuously evolve monitoring capabilities using automation, threat intelligence, and Zero Trust-aligned practices
The position reports to the Director of Cyber Operations / Deputy CISO and partners with the Enterprise CISO, divisional BISOs, Cyber Engineering, and Incident Response teams
Requirements
Bachelor's Degree and 8 years of progressive technical experience in research, engineering and design; Master?s Degree and 6 years of relevant experience; PhD and 4 years of relevant experience
One of the following may be used as an equivalent to Bachelor's Degree for Information Technology Related Positions Only: NNS Apprentice School graduate, Navy Nuclear Power School (NNPS) graduate, Associate's Degree or other formal 2 year program and 2 years of relevant exempt experience or 4 years of relevant non-exempt experience, Military Paygrade E-5 or above military experience, High School/GED and 4 years combined of Manufacturing, Shipbuilding, Trades, Military experience or other relevant exempt experience, High School/GED and 8 years combined of Manufacturing, Shipbuilding, Trades, Military experience or other relevant non-exempt experience
A relevant professional certification can be substituted for a Bachelor's Degree.
Benefits
medical, prescription drug, dental and vision plan choices
on-site health centers
tele-medicine
wellness resources
employee assistance programs
savings plan options (401K)
financial education and planning tools
life insurance
tuition reimbursement
employee discounts
early childhood and post-secondary education scholarships
comprehensive benefits, including medical, prescription drug, dental and vision plan choices
SOC Analyst II providing real time security monitoring and threat hunting services for clients in various industries. Assisting in identifying security incidents and managing vulnerabilities.
Security Incident Response Orchestration Lead at Bank of America defining automation for security incident workflows with a focus on Splunk SOAR and Tines. Collaborating with security operations and engineering teams to implement scalable solutions.
SOC Analyst II providing tier II cybersecurity support in a Security Operations Center environment. Conducting vulnerability assessments and analyzing cyber threats while training junior staff members.
Security Operations Analyst responsible for monitoring and responding to cybersecurity threats. Ensuring the confidentiality, integrity, and availability of data per compliance standards.
SOC Analyst responsible for cybersecurity incident management at Algosystems in Greece. Monitoring security threats, conducting investigations, and improving SOC services.
Cyber Operations Lead ensuring coordination of cyber operations between the Security Operations Center and internal business units. Enhancing security through effective incident response and threat management initiatives.
Solution Sales Manager enhancing revenue in financial services, focusing on ServiceNow IRM and Tanium solutions. Collaborating with teams and engaging C - level executives in Austria and Switzerland.
Senior Internal SOC Analyst leading security triage and investigations for Darktrace, utilizing AI - driven cybersecurity technology. Collaborating on incident response and mentorship within a hybrid work environment.
Security Operations Intern responsible for security monitoring at Paddy Power Betfair. Involves data loss prevention investigations and content filtering analysis with a commitment to improving security posture.