What are the responsibilities and job description for the Security Operations Center Manager position at MTI?
Company Description
MTI is a Technology Management Company.
Job Description
Security Operations Center Manager- Nashville, TN
ALL INTERESTED CANDIDATES ARE HIGHLY ENCOURAGED TO APPLY REGARDLESS OF FULL PROFICIENCY IN ALL REQUIRED SKILLSETS
Job Requirement:
The ideal SOC Manager will possess a strong multi-disciplinary background. A strong technical aptitude across multiple IT arenas paired with outside-the-box thinking and the skillset to turn conceptual ideas into working solutions is imperative. There will be an extremely strong focus on incident detection and response, systems administration, networking, and security. This individual will need to be self-motivated and possess a consultative nature in order work with various IT team members & managers. This role reports directly to Director of Security Operations, who in turn reports directly to the CISO. Frequent executive level interactions, discussions, and briefings will be expected.
As an architect by trade, this will be a heavily technical managerial position. The technical focus of this role is to evaluate multiple existing but independent toolsets and unite them into a single inter-related solutions platform. This will not require customized application development as existing COTS type solutions are in place, however the ability to dynamically integrate custom products would be extremely beneficial. This role will lead in the interaction with both internal and external industry-elite incident response and security analytics & engineering resources. Key project interactions will include SOC development, threat intelligence sharing initiatives, and alpha/beta testing of emerging security solutions.
The successful candidate will be capable of simultaneously meeting four high-level objectives:
Demonstrate proficiency in incident response, kill chain oriented analytics, and identification of IoC’s.
Evaluate, tune, integrate, and optimize existing toolsets to meet monitoring and intelligence sharing requirements
Work directly with senior Security and IT leadership to ensure that the final SOC solutions platform is designed to meet diverse operational goals and initiatives
Identify solution gaps and translate those gaps into succinct (vendor-agnostic) technical requirements
IT management experience and a general understanding of the totality of IT architectures and how they interrelate will be required. From a workflow perspective this candidate will need to understand a tiered work delegation model and be able to design and leverage existing solutions to promote that model. The successful candidate will be able to both evaluate technical solutions from the big picture perspective and actually drill down and configure the solutions independently.
Skills Preferences:
Minimum of 10 years IT experience, with at least 2 years in a SOC or Security Analytics role
Hands-on advanced level experience with both closed and open source SOC technologies to include:
Log management, analytics, and correlation platforms
SIEM solutions
Forensics toolsets
Pen-Test Frameworks & Toolsets
Vulnerability Management Solutions (Nessus, Qualys, Nexpose, etc.)
Endpoint Security Toolsets
UTM products
Demonstrated experience in an incident detection and response oriented security monitoring environment
Expert level hands-on knowledge of installing, configuring, and maintaining network and security monitoring solutions.
Hands on experience in *nix environments and open source toolsets
Administrative experience in VMWare-based environments
Intermediate level of Windows PowerShell and Perl scripting
Knowledge of typical III-Tiered IT support models
Knowledge of how role-based access works within NOC/SOC solutions, and experience implementing it
Technical certifications from GIAC, SANS, Microsoft, Cisco, are highly desirable
Candidates will be required to actively pursue and acquire certification
Qualifications
Computer Science degree
Additional Information
All your information will be kept confidential according to EEO guidelines.