Security Operations Manager
Company: DIVERSANT, LLC
Posted on: May 16, 2022
Diversant currently has a contract Security Operations Center
Manager opportunity available. This opportunity is W2 CONTRACT.
Title: Security Operations Center Manager Type: W2 Contract
Location: Austin, TX (on-site) Background Check Required: CJIS
Background check process Responsibilities You will support the
customer's 24x7Security Operations Center (SOC) Supervise and
monitor the quality of services provided. Recruit, select, train,
assign, schedule, coach, and counsel staff. Communicate job
expectations; plan, monitor, appraise and review job contributions.
Act as liaison between the Security Operations team, the SOC
Manager, and the customer's technical management staff (as
directed). Assist in preparing and completing security action
plans; implementing production, productivity, quality, and
customer-service standards; resolving problems; completing audits;
and identifying trends. Document and escalate incidents (including
event's history, status, and potential impact for further action)
that may cause an ongoing and immediate impact on the environment.
Perform cyber defense trend analysis and reporting. Perform event
correlation using information gathered from a variety of sources
within the enterprise to gain situational awareness and determine
the effectiveness of an observed attack. Provide daily summary
reports of network events and activities relevant to cyber defense
practices. Conduct research, analysis, and correlation across a
wide variety of all source data sets (indications and warnings).
Review and approve procedures and work instructions for use by the
SOC staff (Tier 1 through Tier 3). Train and mentor the Tier 3
analysts and engineers as needed. Provide cyber security
recommendations to leadership based on significant threats and
vulnerabilities. Inform senior management about performance and
issues, including escalations. Monitor and manage customer SLA
compliance for SOC. Monitor documentation to ensure accuracy and
quality. Establish professional development programs with the
Training Coordinator for personnel. Monitor security-related
trends, perform self-development activities and maintain
professional certifications. Complete all security training
required by telecommunications and all customers Qualifying
Experience and Attributes Ability to apply techniques for detecting
host and network-based intrusions using intrusion detection
technologies. Ability to interpret the information collected by
network tools (e.g. Nslookup, Ping, and Traceroute). Knowledge of
computer networking concepts and protocols, and network security
methodologies. Knowledge of cyber security and privacy principles.
Knowledge of cyber threats and vulnerabilities. Knowledge of
encryption algorithms, cryptography, and cryptographic key
management concepts. Knowledge of host/network access control
mechanisms (e.g., access control list, capabilities lists).
Knowledge of vulnerability information dissemination sources (e.g.,
alerts, advisories, errata, and bulletins). Knowledge of incident
response and handling methodologies. Knowledge of information
technology (IT) security principles and methods (e.g., firewalls,
demilitarized zones, encryption). Knowledge of network traffic
analysis methods. Knowledge of new and emerging information
technology (IT) and cyber security technologies. Knowledge of how
traffic flows across the network (e.g., Transmission Control
Protocol [TCP] and Internet Protocol [IP], Open System
Interconnection Model [OSI], Information Technology Infrastructure
Library, current version [ITIL]). Knowledge of key concepts in
security management (e.g., Release Management, Patch Management).
Knowledge of security system design tools, methods, and techniques.
Knowledge of Virtual Private Network (VPN) security. Knowledge of
what constitutes a network attack and its relationship to threats
and vulnerabilities. Knowledge of Insider Threat investigations,
reporting, investigative tools, and laws/regulations. Knowledge of
adversarial tactics, techniques, and procedures. Knowledge of
network tools (e.g., ping, traceroute, nslookup) Knowledge of
defense-in-depth principles and network security architecture.
Knowledge of different types of network communication (e.g., LAN,
WAN, MAN, WLAN, WWAN). Knowledge of file extensions (e.g., .dll,
.bat, .zip, .pcap, .gzip). Knowledge of interpreted and compiled
computer languages. Knowledge of cyber defense and information
security policies, procedures, and regulations. Knowledge of the
common attack vectors on the network layer. Knowledge of different
classes of attacks (e.g., passive, active, insider, close-in,
distribution attacks). Knowledge of cyber attackers (e.g., script
kiddies, insider threat, nation/non-nation state-sponsored).
Knowledge of system administration, network, and operating system
hardening techniques. Knowledge of cyber attack stages (e.g.,
reconnaissance, scanning, enumeration, gaining access, escalation
of privileges, maintaining access, network exploitation, covering
tracks). Knowledge of network security architecture concepts
including topology, protocols, components, and principles (e.g.,
application of defense-in-depth). Knowledge of network systems
management principles, models, methods (e.g., end-to-end systems
performance monitoring), and tools. Signature implementation impact
for viruses, malware, and attacks. Knowledge of packet-level
analysis using appropriate tools (e.g., Wireshark, tcpdump).
Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention
System (IPS) tools and applications. Knowledge of network protocols
such as TCP/IP, Dynamic Host Configuration, Domain Name System
(DNS), and directory services. Knowledge of how to use network
analysis tools to identify vulnerabilities. Knowledge of
penetration testing principles, tools, and techniques. Skill in
detecting host and network-based intrusions via intrusion detection
technologies (e.g., Snort). Skill in using protocol analyzers.
Skill in collecting data from a variety of cyber defense resources.
Skill in recognizing and categorizing types of vulnerabilities and
associated attacks. Skill in reading and interpreting signatures
(e.g., snort). Skill in performing packet-level analysis. US
Citizen and must be able to pass a background check(s)
Keywords: DIVERSANT, LLC, Austin , Security Operations Manager, Executive , Austin, Texas
Didn't find what you're looking for? Search again!