SOC Manager
Job Description
The modern Security Operations Center (SOC) is the nerve center of cyber defense, and AI can revolutionize its efficiency. As a SOC Manager, you will guide AI's understanding of threat detection, incident response workflows, and SIEM optimization, enabling it to become an invaluable asset in proactive cyber defense.
Key Responsibilities
Evaluate AI outputs related to SIEM rule creation, alert triage, and incident prioritization within a SOC context.
Assess the accuracy and effectiveness of AI-generated playbooks for common security incidents (e.g., malware infection, phishing, unauthorized access).
Provide detailed feedback on AI's ability to correlate events from diverse security tools (e.g., EDR, firewall logs, vulnerability scanners).
Develop benchmark scenarios for AI to analyze, covering topics like threat hunting, anomaly detection, and security automation (SOAR).
Validate AI's explanations of SOC metrics (e.g., MTTR, MTTD, false positive rates) and their impact on operational efficiency.
Refine AI's understanding of threat intelligence integration into SIEM and its role in proactive defense.
Ideal Qualifications
Minimum 7 years of experience in a Security Operations Center, with at least 3 years in a leadership or management role.
Certifications such as CISSP, CISM, GCIH, or GCIA are highly preferred.
Extensive hands-on experience with leading SIEM platforms (e.g., Splunk, Microsoft Sentinel, IBM QRadar, Exabeam).
Proven track record in developing and optimizing SOC processes, incident response plans, and threat detection strategies.
Strong understanding of security frameworks (e.g., MITRE ATT&CK, NIST CSF) and their application in a SOC.
Experience with security automation (SOAR) platforms and scripting (Python, PowerShell) for incident response.
Project Timeline
Start Date: Within 2 weeks
Duration: 6-12 months (renewable)
• Commitment: Part-time, 20-30 hours/week
Lead AI to build the SOC of the future – apply today!