Match score not available

SOC Manager

unlimited holidays - extra parental leave - fully flexible
Remote: 
Full Remote
Contract: 
Experience: 
Senior (5-10 years)
Work from: 

Offer summary

Qualifications:

Bachelor's degree in Information Security or IT-related field, 8+ years of SOC/TOC/NOC experience, GCIA and/or GCIH certifications required, Familiarity with intrusion detection systems, Advanced knowledge of network protocols.

Key responsabilities:

  • Supervise the Security Operations Center Team
  • Ensure world-class service for SOC customers
  • Manage post-incident review meetings
  • Oversee incident investigation and response
  • Engage with stakeholders for security improvements
bluevoyant logo
bluevoyant Large https://www.bluevoyant.com/
501 - 1000 Employees
HQ: New York
See more bluevoyant offers

Job description

SOC Manager
Location: Hybrid in Cork, Ireland


Summary
BlueVoyant is looking for a Security Operations Center (SOC) Manager to help our European and UK customers manage their IT security. You will be part of a fast-paced team that helps customers to reduce the impact of security incidents and ensures that critical business operations continue unhindered. 

Key Responsibilities
  • Provides supervision and oversight for the Security Operations Center Team
  • Assumes full responsibility and accountability for ensuring that all SOC customers receive world-class service from all Security Analysts assigned to the Security Operations Center team
  • Provides oversight, guidance, mentorship, and management of all Security Analysts assigned to the Security Operations Center
  • Leads post-incident review meetings to capture lessons learned following the resolution of critical events 
  • Ensures key Security Operations actions incorporate relevant customer impact considerations by engaging key stakeholders and communicating relevant facts and known/suspected implications of technical decisions
  • Validates that Security Operations activities adequately address customer requirements for all MSS services
  • Implements the Security Operations training plan as directed by the Co-Head(s) of Global SOC Operations and develops the training plan for Security Operations Center staff
  • Supervise operations in deterring, identifying, monitoring, investigating, and analyzing computer network intrusions.
  • Supervises complex event investigation and incident declaration
  • Ensure events are properly identified, analyzed, and escalated to incidents.
  • Hunt for suspicious activity based on anomalous activity and indicators of compromise from various intelligence feeds and toolsets.
  • Participate in the response, investigation, and resolution of security incidents.
  • Create knowledge base articles for handling medium and high severity incidents.
  • Assist in the advancement of security policies, procedures, and automation.
  • Provide incident investigation, handling, and response to include incident documentation.
  • Develop incident response reporting and policy updates as needed.
  • Serve as the technical escalation point and mentor for lower-level analysts
  • Regularly communicate with customer IT teams to inform them of issues, help them remediate, and ensure that they continue to operate business as usual
  • Maintain a strong awareness of the current threat landscape.
Basic Qualifications
  • Excellent teamwork skills
  • Knowledge of and experience with intrusion detection/prevention systems and SIEM software
  • Advanced knowledge and understanding of network protocols and devices.
  • Advanced experience with Mac OS, Windows, and Unix systems.
  • Ability to analyze event logs and recognize signs of cyber intrusions/attacks
  • Ability to handle high pressure situations in a productive and professional manner.
  • Ability to work directly with customers to understand requirements for and feedback on security services
  • Advanced written and verbal communication skills and the ability to present complex technical topics in clear and easy-to-understand language
  • Strong teamwork and interpersonal skills, including the ability to work effectively with a globally distributed team
  • Able and willing to work in a 24/7/365 environment, including nights and weekends
  • Ability to provide create signatures for security tools
  • Familiarity with tools such as Wireshark, TCP Dump, Security Onion, and Splunk
  • Strong knowledge of the following:
    • SIEM
    • Packet Analysis
    • SSL Decryption
    • Malware Detection
    • HIDS/NIDS
    • Network Monitoring Tools
    • Case Management System
    • Knowledge Base
    • Web Security Gateway
    • Email Security
    • Data Loss Prevention
    • Anti-Virus
    • Network Access Control
    • Encryption
    • Vulnerability Identification
Preferred Qualifications
  • Experience in network/host vulnerability analysis, intrusion analysis, digital forensics, penetration testing, or related areas
  • 8+ years of hands-on SOC/TOC/NOC experience
  • GCIA and/or GCIH required. GCFA, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred
  • Familiarity with tools such as IDA Pro, PEiD, PEview, Procmon, Snort, Bro, Kali Linux, Metasploit, NMAP, and Nessus
  • Familiarity with GPO, Landesk, or other IT Infrastructure tools
  • Understanding and/or experience with one or more of the following programming languages: .NET, PHP, Perl, Python, Java, Ruby, C, C++
Education
  • Minimum bachelor’s degree in Information Security, Computer Science, or another IT-related field. Exceptional candidates with proven experience in security/network operations will also be considered
About BlueVoyant

At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics, and technology, coupled with deep expertise, works as a force multiplier to secure your full ecosystem. Accuracy! Actionability! Timeliness! Scalability!

Led by CEO, Jim Rosenthal, BlueVoyant’s highly skilled team includes former government cyber officials with extensive frontline experience in responding to advanced cyber threats on behalf of the National Security Agency, Federal Bureau of Investigation, Unit 8200, and GCHQ, together with private sector experts. BlueVoyant services utilize large real-time datasets with industry leading analytics and technologies.

Founded in 2017 by Fortune 500 executives, including Executive Chairman, Tom Glocer, and former Government cyber officials, BlueVoyant is headquartered in New York City and has offices in Maryland, Tel Aviv, San Francisco, London, Budapest, and Latin America.

All employees must be authorized to work in Ireland. BlueVoyant provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, BlueVoyant complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities.

BlueVoyant Candidate Privacy Notice

To understand how we secure and manage your personal data upon submitting a job application, please see our Candidate Privacy Notice, which can be found here - Candidate Privacy Notice

Required profile

Experience

Level of experience: Senior (5-10 years)
Industry :
Cybersecurity
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Time Management
  • Teamwork
  • Communication
  • Problem Solving

Related jobs