Job was saved successfully.
Job was removed from Saved Jobs.

Job Details


SOC Operations Manager (LOCAL REMOTE)

Operations

Security Operations

No

Herndon, Virginia, United States

Description

Job Description:

The Transportation and Border Security Services (T&BSS) Division has an opening in Northern Virginia for an SOC Operations Manager to support our TSA customer in their Security Operations Center.

**This position offers LOCALLY remote capability. Must be willing to report onsite as needed.**

Primary Responsibilities

  • Drive implementation and improvement of new tools, capabilities, frameworks, and methodologies across all teams within the SOC

  • Manage and conduct hands-on technical analysis as a supplement to the Incident Response and Forensics Teams during high-visibility or high-workload investigations

  • Suggest and implement controls for key information security gaps within the customer security infrastructure

  • Conduct and maintain detailed gap analysis of customer capabilities

  • Develop and enforce event response and escalation documentation and processes for Security Operations Center to follow

  • Must possess a functional understanding of log and monitoring management systems, security event monitoring systems, network-based and host-based intrusion detection systems, firewall technologies, malware detection and enterprise-level antivirus solutions/systems, VPN technologies and encryptions standards

  • Must possess a working knowledge of the various industry standard IA disciplines and generally accepted practices governing the present day IA industry. These disciplines include security event monitoring, incident response, security architecture and engineering, independent verification and validation of information technology and security infrastructures, compliance and policy practices, system audits, and risk assessments

  • Must possess a working knowledge of regulatory compliance directives to include various NIST and DHS 4300A/B security controls and FISMA monitoring and reporting requirements

  • Must have demonstrated experience with managing and ensuring the timely response and investigations of security events and incidents by the security operations center

  • Must have experience with creating and maintaining shift schedules to ensure 24x7 coverage by operations support personnel

  • Must have experience with conceptualizing, developing, publishing and communicating status reports for executive leadership

  • Must have experience with the developing, implementing and overseeing SOC standard operating procedures used to guide daily activities of the operations center

  • Will work regular 8:00 – 5:00 pm hours, on-call and after-hours support in response to incidents as dictated by mission requirements

  • Continually mature SOC operations and capabilities, developing intra-team relationships, and building trust and rapport with external stakeholders

Minimum requirements include:

  • Active Top Secret clearance with the ability to obtain SCI

  • Bachelor’s or Master’s Degree in Information Technology or related disciplines; or have equivalent and direct experience with the management, operation and direction of a network and/or security operations center

  • 10 years of experience within the IA/Cyber Security industry, four years of which must have been managing a security operations center responsible for security event monitoring and incident response services within an enterprise network security environment

Preferred Qualifications

  • Experience with Cloud Service Providers, familiarity with cloud architectures, and performing Incident Response involving cloud assets

  • Advanced knowledge in planning, directing, and managing Computer Incident Response Team (CIRT) and/or Security Operations Center (SOC) operations for a large and complex enterprise

  • Demonstrated mastery of the life cycle of cybersecurity threats, attacks, attack vectors, and methods of exploitation with an understanding of intrusion set tactics, techniques, and procedures (TTPs).

  • Extensive leadership experience creating, building, and maintaining high-performing teams, particularly in a cybersecurity environment

  • Previous experience managing an enterprise SOC/NOC/NOSC

  • Certification: CISSP, CISM, or GCIH; Splunk (Power User or Admin), Cloud Provider (AWS, Azure, GCP), SANS (GCFA, GMON, etc.)

Pay Range:Pay Range $113,100.00 - $174,000.00 - $234,900.00

The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.