Summary:
The SOC Manager will be responsible for overseeing the day-to-day operations and strategic direction of the Security Operations Center (SOC). This role involves leading a team of security professionals, developing, and implementing security strategies, overseeing, and managing incident response lifecycle and ensuring the SOC's effectiveness in detecting, responding to, and mitigating security threats.
Principal Functions and Key Responsibilities:
- Developing the strategic vision, objectives, and goals for the SOC.
- Align SOC activities with the organization's overall security strategy.
- Manage a team of security analysts and professionals.
- Assign tasks, set performance expectations, and promote professional development.
- Develop and implement incident response plans.
- Single point of contact during Cybersecurity incidents (as security incident manager) .
- Coordinate with stakeholders for timely and effective incident resolution.
- Select, implement, and manage security monitoring tools and technologies.
- Ensure the SOC has the necessary capabilities to detect, analyze, and respond to security incidents.
- Establish and enforce security policies, procedures, and guidelines.
- Ensure compliance with regulatory requirements and industry best practices.
- Providing a realistic overview of risks and threats to senior management.
- Ensuring SLA compliances, process adherence and process improvement.
- Formulate metrics to measure the effectiveness of security use cases and overall, SOC performance (KPI and KRI Development).
- Lead and manage complex 5G-related security incidents, coordinating with various teams to ensure timely remediation.
- Generate in-depth performance reports and metrics to highlight security posture and areas of improvement.
Qualifications:
- Advanced knowledge of best practices in Information systems security.
- Excellent management skills, communication skills and security fundamentals.
- Knowledge of common security threats, vulnerabilities, and attack vectors.
- Strong commitment to continuous learning and professional development.
- Experience in 4G/5G Security Operations.
- Experience working in ISP’s on 4G/5G technologies is a plus.
- Experience working on Splunk and MS Sentinel.
Certifications: CISSP, Elastic Certified Analyst, GCIH (GIAC Certified Incident Handler), (GIAC Certified Intrusion Analyst), BTL1 (Blue Team Level 3), MITRE Attack Defender (MAD).
Soft Skills: Excellent communication, problem-solving, and leadership skills.
Experience: 8-12 years