This role leads a global team responsible for 24/7 security monitoring, incident response, and threat detection. It focuses on optimizing operational workflows, mentoring analysts, and integrating new technologies to enhance security effectiveness. The position also involves strategic planning, cross-functional collaboration, and representing the SOC externally.
Key Highlights
Technical Skills Required
Benefits & Perks
Job Description
This position is posted by Jobgether on behalf of a partner company. We are currently looking for a Manager, Security Operations Center - Pacific or Mountain Time Zone in the United States.
As a Manager in a Security Operations Center (SOC), you will lead a global team of security analysts responsible for 24/7 monitoring, investigation, and incident response across millions of endpoints. You will define and optimize operational workflows, streamline processes, and enforce standards that improve efficiency and reduce analyst burnout. This role includes mentoring analysts, developing training programs, and collaborating with cross-functional teams to enhance threat detection and response capabilities. You will play a critical role in scaling SOC operations, ensuring service level objectives are met, and implementing new technologies that augment analyst effectiveness. The position demands strategic thinking, technical expertise, and a passion for operational excellence in a fast-paced, cybersecurity-focused environment. You will also provide technical leadership, influence company-wide security initiatives, and represent the SOC in both internal and public-facing forums.
- Accountabilities
- Design, implement, and enforce processes and playbooks to optimize SOC operations and analyst productivity.
- Manage global shift coverage to maintain 24/7 monitoring and incident response.
- Conduct regular one-on-one meetings with analysts to provide feedback, gather input, and support career development.
- Lead the creation and delivery of training programs in Digital Forensics, Incident Response, Malware Analysis, Threat Hunting, Detection Engineering, and Automation.
- Partner with product and engineering teams to prioritize tools and capabilities that enhance SOC efficiency.
- Oversee quality assurance and operational performance metrics for the SOC.
- Collaborate with support and other security teams to streamline workflows and integrate incident response procedures.
- Provide technical guidance and leadership for SOC analysts and ensure alignment with organizational security goals.
- Develop, track, and report on objectives, key results, and performance indicators related to SOC initiatives.
- Support operationalization of new security technologies and services.
- Requirements
- Based in Pacific or Mountain Time Zone in the US.
- 5+ years of hands-on security analyst experience, preferably in a global 24/7 SOC environment.
- 2+ years of experience managing or leading security teams in SOC, Incident Response, MSSP, or MDR settings.
- Expertise in Windows forensics, Digital Forensics, Malware Analysis, Incident Response, Threat Hunting, and Detection Engineering.
- Proven ability to design and document workflows, processes, and standard operating procedures.
- Strong communication skills for conveying technical concepts to diverse stakeholders.
- Active engagement in the cybersecurity community through conferences, public contributions, or continuous learning.
- Experience managing cross-functional initiatives and tracking data-driven outcomes.
- Strategic thinker with a focus on scalability, operational efficiency, and team development.
- Benefits
- 100% remote work from the Pacific or Mountain Time Zone.
- Competitive base salary ($165,000–$185,000 USD) plus bonus and equity.
- Generous paid time off, including vacation, sick leave, and holidays.
- 12 weeks of paid parental leave.
- Comprehensive medical, dental, and vision plans.
- 401(k) plan with 5% company contribution.
- Life and disability insurance.
- Stock options for full-time employees.
- Home office reimbursement and professional development allowances.
- Digital stipend and access to coaching/personal growth platforms.
- Inclusive and supportive team culture emphasizing professional growth and career development.
When you apply, your profile goes through our AI-powered screening process designed to identify top talent efficiently and fairly.
🔍 Our AI evaluates your CV and LinkedIn profile thoroughly, analyzing your skills, experience, and achievements.
📊 It compares your profile to the job’s core requirements and past success factors to determine your match score.
🎯 Based on this analysis, we automatically shortlist the three candidates with the highest match to the role.
🧠 When necessary, our human team may perform an additional manual review to ensure no strong profile is missed.
The process is transparent, skills-based, and free of bias — focusing solely on your fit for the role. Once the shortlist is completed, we share it directly with the company that owns the job opening. The final decision and next steps (such as interviews or additional assessments) are then made by their internal hiring team.
Thank you for your interest!
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.