Location: Remote • Alabama, Arizona, Florida, Hawaii, Idaho, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Mississippi, Missouri, Montana, New Hampshire, New Mexico, New York, North Carolina, North Dakota, Ohio, Oklahoma, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, West Virginia, Wisconsin, Wyoming • 🇺🇸 United States
Lead analysis of current SOC environment to identify critical deficiencies, legacy and technical debt, and recommend solutions for improvement.
Develop the technical architecture for monitoring, detecting, and responding to security incidents, including log streaming platforms, SIEM systems, and automated response capabilities.
Evaluate, select, and design integration of security tools such as SIEM systems, data pipeline tools, threat intelligence platforms, incident response tools, SOAR platforms, and forensic tools.
Design the implementation of automation workflows using SOAR tools to improve incident response and threat detection.
Define logging and monitoring standards for applications, infrastructure, and endpoints.
Ensure the SOC infrastructure is scalable, redundant, and able to handle growing volumes of data and alerts.
Create architectural diagrams, strategies, and standard operating procedures.
Guide SOC team members on best practices in architecture, automation, and operations.
Collaborate with partners to align security strategy with organizational goals and compliance requirements.
Stay updated on the security landscape, the latest security threats, and vulnerabilities to improve cybersecurity capabilities and adapt the SOC and other strategies accordingly.
Requirements
10+ years of relevant experience with roles solving complex challenges through design and implementation of security operations processes.
7+ years of experience working in security operations, a Security Operations Center (SOC), or a cyber incident response team (CIRT).
2+ years experience managing SIEM solutions or data pipeline tools like Splunk, Azure Sentinel, or Cribl.
Master's degree in Cybersecurity, or a related field.
Experience with Azure cloud security and hybrid environments.
Proficiency in scripting and automation (e.g., Python, PowerShell).
Experience partnering with diverse teams (e.g. team members, other architects, developers) and work with members at all levels within SNHU.
Experience with cybersecurity and information assurance regulations such as NIST, FERPA, PCI-DSS.
Benefits
High-quality, low-deductible medical insurance
Low to no-cost dental and vision plans
5 weeks of paid time off (plus almost a dozen paid holidays)
Employer-funded retirement
Free tuition program
Parental leave
Mental health and wellbeing resources
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.