
Cyber Operations Advisor
Optiv
full-time
Posted on:
Location Type: Remote
Location: Massachusetts • North Carolina • United States
Visit company websiteExplore more
About the role
- Independently lead multiple concurrent technical engagements, driving high-quality, efficient, and timely outcomes across client environments
- Translate customer business requirements into specific features and functionality
- Facilitate and lead client business review sessions through direct meetings and strong relationships with key client contacts, ensuring alignment with evolving security priorities and business objectives
- Work closely with engagement leads to develop plans, roadmaps and strategy execution programs
- Maintain responsibility for simultaneous projects (leading, project knowledge and client details)
- Rationalize security solutions against requirements, risks, constraints and strategic client objectives.
- Assist in the documentation of business requirements, use cases and investment return "value" achievement plans.
- Contribute or lead pre-sales and post-sales engagements as a key technical focal point.
- Use background experience in a large enterprise environment to analyze security event data for attack patterns and understand attacker tactics.
- Contribute in a technical capacity to business proposals, contracts and requests for information/proposals.
- Identify and communicate cross-sell and up-sell opportunities across AFC services.
- Support information security projects from inception to completion.
- Assist with designing and documenting work processes for the delivered solution.
- Working experience with Threat intelligence teams to be able to interpret IOC’s and use them efficiently for alerting.
- Understanding of monitoring devices such as firewalls, network and host-based intrusion detection systems, web applications, AV, WAF, Proxy and operating system logs.
- Create technical documentation around the content deployed to the SIEM.
- Ability to recognize patterns and inconsistencies that could indicate complex cyber-attacks.
- Perform formal Architectural Review.
- Create custom rules/rule modifications and custom reports/ report modifications as needed.
- Assist with platform configurations, detection logic, automation improvements.
- Build and develop relationships with internal and external stakeholders.
- Effectively delegate and ensure timely completion of all open tickets with client.
- Assist with Identifying and assessing project risk.
- Build appropriate mitigation plans into the overall project initiatives.
- Assist in overall service offering quality and consistency, including SOC operations and platform engineering quality.
- Assist in the Validation of the scope of the offering and of the project.
- Represent Optiv Security in customer meetings.
- Meet regularly with team to aid in identifying issues and strategies.
- Assist in actively monitoring deliverables and open tickets.
- Support projects across various functional groups, communicating impacts.
- Establish communication plans to facilitate core project team coordination and to provide status to management and extended project team members.
- Assist project management on assigned projects to ensure projects are delivered on time, within budget, adhere to high quality standards and meet customer expectations.
- Assist in Identifying and prioritizing opportunities for using project and program management to achieve the goals of the enterprise.
- Maintain working relationships with subject matter experts and personnel across the organization.
- Perform other duties as assigned.
Requirements
- Bachelor’s degree or equivalent experience with 8+ years in cybersecurity operations, including advisory or leadership roles
- Proven experience leading client-facing engagements and strategic programs within professional services or consulting environments
- Deep understanding of SOC operations, threat analysis, SIEM, identity, risk assessment, and incident response frameworks
- Expert knowledge of NIST CSF, MITRE ATT&CK, and regulatory standards (PCI, SOC 2, ISO 27001)
- Demonstrated understanding of multiple cyber security platforms; SIEM, firewall, UTM, IDPS, Endpoint Security, vulnerability scanning, identity solutions, etc.
- Preferred certifications: CISSP, CISM, GCIH, or equivalent senior-level security credentials
- Exceptional communication skills with ability to deliver executive-level reporting and influence stakeholders
- Ability to build trust and maintain relationships with senior client stakeholders and internal teams
- Proficiency in cloud security (AWS, Azure, GCP) and virtualization/containerization technologies
- Working knowledge of project management methodologies (Agile, Scrum, PMI) and experience driving security initiatives
- Experience related to security/infrastructure design, risk analysis and mitigation, disaster/contingency planning, certification/compliance testing, data loss prevention, Network Security Strategies, Technical Documentation, industry standards such as ITIL, COBIT, ISO standards, PCI, SOX, Rollout/Implementation and User Training/Support preferred.
- Ability to read, analyze and interpret common scientific and technical journals.
- Ability to respond to common inquiries or complaints from customers, regulatory agencies, or members of the business community.
- Ability to write speeches and articles for publication that conform to prescribed style and format.
- Ability to effectively present information to top management, public groups, and/or boards of directors.
Benefits
- A company committed to our inclusive value through our Employee Resource Groups
- Work/life balance
- Professional training resources
- Creative problem-solving and the ability to tackle unique, complex projects
- Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities.
- The ability and technology necessary to productively work remotely/from home (where applicable)
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
cybersecurity operationsthreat analysisSIEMidentity solutionsrisk assessmentincident responsesecurity event data analysisproject managementcloud securityvulnerability scanning
Soft Skills
communication skillsrelationship buildingleadershipdelegationstrategic planningproblem-solvinginfluencing stakeholdersteam coordinationclient engagementexecutive-level reporting
Certifications
CISSPCISMGCIH