Lead regional operations of Security Operations Center managing personnel and enhancing service delivery. Oversee cybersecurity functions in a global MSSP environment.
Responsibilities
Supervise U.S. SOC personnel, ensuring professional development, clear performance expectations, and operational excellence.
Promote a culture of accountability, continuous learning, and customer-first thinking across all SOC functions.
Lead efforts to attract, retain, and grow SOC talent, fostering a high-performing and collaborative regional team.
Develop and maintain U.S. SOC staffing and coverage models, ensuring consistency, quality, and responsiveness to customer alerts and incidents.
Drive effective delivery of all SOC services and continuous improvement of operational procedures, informed by metrics and data-driven insights.
Oversee escalation and incident management for the region, training leads and analysts to handle high-impact events and executive communications effectively.
Contribute to the SOC’s tooling and automation roadmap, clarifying requirements, supporting integrations, and collaborating with global engineering counterparts.
Stay actively involved in analyst training, solution validation, and process optimization to enhance detection and response capabilities.
Represent the SOC in cross-functional initiatives, customer interactions, and leadership discussions where technical and operational alignment is critical.
Requirements
****Qualifications*****Minimum Qualifications***
Experience in Cybersecurity, Information Systems, or a related technical field focused on security operations or incident response.
2+ years managing a SOC or multi-team security monitoring environment.
Strong technical understanding of operating systems, network defense, and incident response.
Excellent written and verbal communication skills with both technical and executive stakeholders.
*Preferred Qualifications***
5+ years of experience as a SOC or incident response analyst.
MSSP or MDR experience strongly preferred.
Familiarity with EDR (SentinelOne, CrowdStrike, Microsoft Defender) and SIEM/SOAR tools (Splunk, QRadar, Sumo Logic).
Understanding of automation, orchestration, and AI/ML in SOC operations.
Relevant certifications such as CISSP, CISM, GCIH, or equivalent.
Experience with cloud security monitoring (AWS, Azure, GCP).
Benefits
**Comprehensive Benefits Package Includes:**
Medical, Dental and Vision Insurance
401(k) Plan with Company Match
Tuition Assistance Program
Generous PTO after first 90 days
Company match to Employee Charitable contributions
Additional Voluntary benefits
Plus other Perks to support your well-being
Including Hybrid Work environment for roles based in Austin, Texas
Solution Sales Manager enhancing revenue in financial services, focusing on ServiceNow IRM and Tanium solutions. Collaborating with teams and engaging C - level executives in Austria and Switzerland.
Senior Internal SOC Analyst leading security triage and investigations for Darktrace, utilizing AI - driven cybersecurity technology. Collaborating on incident response and mentorship within a hybrid work environment.
Security Operations Intern responsible for security monitoring at Paddy Power Betfair. Involves data loss prevention investigations and content filtering analysis with a commitment to improving security posture.
SOC Analyst L2 responsible for managing and analyzing security incidents in digital transformation. Contributing directly to the protection of companies and infrastructures.
Senior Manager leading global IT security operations to protect company data and assets at Keenova. Overseeing incident response, monitoring, and cybersecurity capabilities with strategic oversight.
Security Operations Center leader at Woven by Toyota, managing triage and response to security alerts in Japan. Collaborating with global SOCs to ensure 24/7 operations.
GSOC Analyst responsible for security operations at Paramount Studios. Developing workflows, incident response, and risk monitoring in a dynamic team environment.