Security Operations Center Manager

Atlanta, GA

Applications have closed
AmeriSave Mortgage is currently seeking a SOC Manager, in the Atlanta market. The SOC (Security Operations Center) Manager supervises, leads, and mentors SOC teams) by drawing on a deep knowledge of security operations, enterprise business and security needs, architecture, and forensic and investigative expertise.  This individual must prioritize daily operational activities and ensure a high level of productivity and efficiency from the SOC.  Firsthand engineering experience is welcome, but significant analyst experience – including experience triaging and coordinating major incidents -- is a requirement.  A SOC manager must be able to demonstrate the ability to think through high pressure scenarios and direct his/her team appropriately.  This may include providing analysis and forensic expertise when necessary. 
Additionally, the manager must be able to communicate clearly, concisely, and accurately with Amerisave departments.  They should be a technical expert in tools, solutions, and processes, and can not only identify shortfalls and breakdowns, but also intuitively suggest and implement solutions.  They are expected to carry their expertise and authority into calls or meetings with internal customers and partners.  They may also be asked to contribute to discussions on personnel matters.
At AmeriSave, we're one team with one shared dream - to be the best. We’re dedicated to building an inclusive culture where employees are empowered and supported to do their best work - whether from home or in the office. 
Why AmeriSave? What you'll find at AmeriSave is that we don’t just set you up for success, we set you up to WIN. Team members are provided with cutting edge origination software, CRM, marketing automation, data reporting / analytic software, and leading mortgage application technologies to help make more deals happen. Our culture at AmeriSave is casual and fun, and we offer competitive compensation and benefits.
AmeriSave is the company you’ve been waiting to work for! 

Leadership Requirements:

  • Strong verbal/written communication and interpersonal skills to document and communicate findings, escalate critical incidents, and interact with internal customers and departments
  • Knowledge of enterprise security architecture as well as the intersection of business and security needs. 
  • Must understand SOC teams, roles, and specialty functions.
  • Understanding of incident response methodologies and reporting.
  • Intuitive sense of user needs and how those translate to service delivery.
  • Good sense of conflict resolution and how to exercise available resources in the interest of sound, fair decision making.
  • Ability and desire to mentor junior and senior analysts.
  • Team leadership experience.
  • Outstanding communication skills and a willingness to speak with users and other departments. 
  • Strong security intuition, critical thinking, and the ability to convey this through leadership and sound decision-making during outages, issues and incident response scenarios. 

Technical Requirements:

  • Deep understanding of security technologies – Firewalls, IDS/IPS, SIEM, EDR tools, enterprise architecture, email filtering tools.
  • Experience performing forensic analysis of network logs and packets to identify compromise artifacts (6+ years).
  • Ability to identify actionable indicators of compromise based upon analysis of network forensic data.
  • Ability to analyze captured data or logs to perform incident response and identify compromises to customer networks
  • Strong research background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis preferred.
  • Experience using ticketing systems for tracking (JIRA, Remedy, Zendesk, ServiceNow, etc)

Qualifications:

  • Minimum of six years of consistent SOC experience performing triage/incident response in enterprise environments.  At least 2-3 years must be in a small-team/department leadership capacity.
  • Bachelor's degree in Information Security, Computer Science, Computer Engineering, or equivalent work experience.
  • Minimum of a GIAC security certification such as GCIA, GCIH, GREM, GPEN (or equivalent), multiple preferred.
California Consumer Privacy Act Disclosure AcknowledgmentEmployment Applicants, New Hires, and Employees Residing in California
AmeriSave Mortgage Corporation’s California Consumer Privacy Act Policy Statement (“Policy”) can be reviewed here: www.amerisave.com/privacy-policy.   
When AmeriSave’s Human Resources Department makes future requests for personal information, the same Policy is applicable. By applying, you understand this acknowledgment covers current and future personal information requests. You also acknowledge the business purpose of the personal information collected and that future requests may occur while applying for a position at AmeriSave and/or during employment, if applicable. 

Tags: Automation Computer Science EDR Firewalls GCIA GCIH GIAC GPEN GREM IDS Incident response IPS Jira Privacy SIEM SOC

Perks/benefits: Competitive pay Team events

Region: North America
Country: United States
Job stats:  6  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.