Security Operations Center (SOC) Manager
New York, NY, United States
Position Summary
The Security Operations Center (SOC) Manager plays a critical role in maintaining and advancing the security posture of the University by managing the day-to-day operations of the SOC. Ensure the effective detection and response to cybersecurity threats, providing leadership to a team of skilled security analysts and our Managed Detection and Response (MDR) company, and implementing lessons learned from previous security incidents.
Fully remote work may be considered.
Qualifications
Required Education:Bachelor's Degree or equivalent in Computer Science, Information Technology, or CybersecurityPreferred Education:Bachelor's Degree in Computer Science or a related field.Required Experience:5+ years relevant security operations experience including experience in cybersecurity or equivalent combination of education and experience. Previous working experience with detection engineering and/or as a SOC analyst. Leadership experience working across a diverse team. Building a threat detection program using risk-based analysis as the foundation. Experience in leading the full life cycle of a security incident, detection, and response journey with the ability to see incidents to their conclusion.Preferred Experience:7+ years of experience with detection engineering and/or as a SOC analyst. Leadership experience working across a diverse team, including remote workers.Required Skills, Knowledge and Abilities:Fundamentals of networking and operating systems. Strong communication skills and the ability to work with a variety of stakeholders. In-depth knowledge of cybersecurity threats and incident response. Ability to work under pressure and prioritize tasks accordingly. Familiarity with many enterprise security and IT products such as firewalls, EDR, NSM, TIP, threat feeds, cloud services, and how they all fit together. Excellent verbal and written communication skills.Preferred Skills, Knowledge and Abilities:Strong public speaking skills. Knowledge of Windows, macOS and Linux operating systems and how to investigate suspicious activity. Basic Linux system administration & troubleshooting experience. Proficiency in developing automation scripts to solve problems. Using SIEMs (such as Splunk Enterprise Security) to perform log analysis.
Additional Information
In compliance with NYC's Pay Transparency Act, the annual base salary range for this position is USD $160,000.00 to USD $180,000.00. New York University considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/training, key skills, internal peer equity, as well as, market and organizational considerations when extending an offer. This pay range represents base pay only and excludes any additional items such as incentives, bonuses, clinical compensation, or other items. NYU aims to be among the greenest urban campuses in the country and carbon neutral by 2040. Learn more at nyu.edu/nyugreen.EOE/AA/Minorities/Females/Vet/Disabled/Sexual Orientation/Gender Identity
ApplyJob Profile
Fully remote Fully remote work may be considered Green initiatives Remote work
Tasks- Implement incident response
- Lead security analysts
- Manage SOC operations
Automation scripting Cloud Services Communication Cybersecurity Detection engineering EDR Education Firewalls Incident Response Linux MacOS Networking NSM Operating Systems Organizational SIEM Splunk Threat Detection Threat feeds TIP Windows
Experience5 years
Education TimezonesAmerica/Anchorage America/Chicago America/Denver America/Los_Angeles America/New_York Pacific/Honolulu UTC-10 UTC-5 UTC-6 UTC-7 UTC-8 UTC-9