Optiv

Cyber Operations Manager – Threat Operations

Optiv

full-time

Posted on:

Location Type: Remote

Location: MassachusettsMontanaUnited States

Visit company website

Explore more

AI Apply
Apply

Salary

💰 $134,600 - $184,500 per year

Job Level

About the role

  • Lead 24x7 Threat Detection and Response Analysts providing operational and strategic planning, including fostering innovation, planning projects, and organizing and negotiating the allocation of resources as well managing the day-to-day operations.
  • Work closely with customers on reporting, stewardship calls, and in the case of escalations.
  • Enforce all policies and procedures, including those for security, disaster recovery, standards, and service provision.
  • Drive continuous refinement and improvement of detection and response and incident response processes.
  • Oversee the security of Client systems via Advanced Fusion Center (AFC) service.
  • Keep current with the latest vendor updates, expansion opportunities, and technology directions, utilized in the Clients environment.
  • Collaborate and consult with other Managers on the overall advancement of the Security Operations organization and Optiv in general.
  • Direct and drive process and documentation improvement.
  • Manage staffing, including recruitment, supervision, scheduling, development, evaluation, and disciplinary actions.
  • Develop and maintain an educational environment where the knowledge and performance of the group are constantly advancing.
  • Perform staff performance appraisals.
  • Ensure timely reporting of security control gaps and vulnerabilities to the customer.
  • Prepare reporting of metrics and trending of SLA & KPIs to the customer and client support staff.
  • Stay abreast of evolving risks, new developments in the security industry, and industry best practices in risk management, threat analysis, and threat response techniques.
  • Attend info security-related events and network with industry peers to inform engineering and operations processes of effective risk mitigation strategies for attacks.
  • Oversee team’s production of threat intelligence reports that communicate the results of the analyses to the respective audience.
  • Responsible for the joint team effort to normalize data from vulnerability assessment, penetration test, incident response, and application security project deliverables.
  • Establish and maintain regular written and in-person communications with the organization’s executives, other group heads regarding pertinent activities.
  • Develop and mentor staff through open communication, training and development opportunities, and performance management processes; build and maintain employee morale and motivation.

Requirements

  • 12+ years professional IT and Information Security experience
  • 5+ years leading technical Threat Detection and Response teams
  • 5+ years professional experience in cyber operations centers
  • 3+ years professional experience in managed services
  • Prior management experience within an MSSP environment preferred
  • One or more certifications in Security/Networking including Security+, GSEC, GCIA, GCIH, CISSP, CISM, CISA, or other security-specific vendors/product certifications
  • Proven ability to make decisions and perform complex problem-solving activities under pressure.
  • Advanced business acumen required.
  • Sharp analytical abilities and the ability to make sound decisions quickly are required.
  • Deep understanding of SIEM vendors, solutions, and architecture such as LogRhythm, QRadar, Splunk, Exabeam, etc.
  • Deep understanding of EDR vendors, solutions, and architecture such as Crowdstrike, Cylance, Carbon Black, Microsoft ATP.
  • Deep understanding of regulatory compliance such as NIST, SOX, HIPPA, NERC CIP, PCI, etc. and their differentiators across global regions
  • Deep understanding of laws pertaining to cybersecurity and their differentiators across global regions
  • Understanding of Security Orchestration, Automation, and Response concepts.
  • Experience working with ticketing and knowledge management systems such as Service Now.
  • Experience with ITIL concepts and practices.
  • Experience with security analytics platforms such as Kibana.
Benefits
  • A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups.
  • Work/life balance
  • Professional training resources
  • Creative problem-solving and the ability to tackle unique, complex projects
  • Volunteer Opportunities.
  • “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities.
  • The ability and technology necessary to productively work remotely/from home (where applicable)
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
Threat DetectionIncident ResponseCyber OperationsManaged ServicesSecurity OrchestrationAutomationSecurity AnalyticsSIEMEDRVulnerability Assessment
Soft Skills
LeadershipProblem SolvingAnalytical AbilitiesDecision MakingCommunicationTeam DevelopmentResource ManagementNegotiationPerformance ManagementInnovation
Certifications
Security+GSECGCIAGCIHCISSPCISMCISA