Cybersecurity Security Operations Center Manager
Cleveland, OH, United States
Sherwin-Williams
Discover the possibilities of Sherwin-Williams® paint with over 1700 paint colors. Get paint color tips, project ideas & product advice for DIY and Pros.- Manage team employees reporting directly to you. Responsibilities include preparing midyear and annual staff evaluations and addressing both opportunities for growth (such as promotions) or improvement (such as employee performance improvement plans) as performances warrant.
- Manage the on-call rotation and time off for the SOC
- Providing regular training sessions and mentorship opportunities to facilitate knowledge-sharing within the team.
- Hiring new staff members or contracting outside services to supplement your team's capabilities when needed.
- Support existing and future contractual relationships with technology and service providers. This includes working with providers to address support issues as well as working with management and procurement.
- Work with upper management to track and manage team spending and assist in preparing annual budgets.
- Lead your team and communicate with management during incident response (IR) to ensure timely notification and containment occur. Responsibilities include ensuring communicating, documenting IR progress, and following through with post-mortem reviews.
- Ensure CSOC meets regulatory compliance of both internal and external auditors by adherence to policies and procedures. Ensure version control of SOC alerts as well as least privilege access to logs and investigation data.
- Ensure synchronization and collaboration between the CSOC and Cyber Threat Intelligence team.
- Work with other departments to identify the root causes of security incidents and develop strategies to mitigate these risks.
Strategy & Planning
- Work with employees on Individual Development plans. Interface with management and Human Resources to ensure plans meet business needs and provide measurable advancement steps to employee promotion and realization of career goals.
- Provide insight and guidance in support of Governance Board meetings for existing or future spend
- Plan out and monitor annual spend for CSOC.
- Improve incident response times, reduce false positives and other extraneous alerts, and enhancing threat detection capabilities.
- Work with CSOC and architecture in determining technology and resource requirements.
- Participate in engagement with other service families and departments in addressing CSOC logging and monitoring needs. Engage with same groups in developing Enterprise logging and monitoring strategies and solutions.
- Stay abreast of business and technological developments to properly prepare CSOC future posture.
- Work with upper management to understand budget availability to shape CSOC efforts.
- Supervise team and/or perform compliance assessments to include Proof of Value (PoV) or Proof of Concept (PoC) for new program security tools.
- Provide an accurate technical evaluation of the software application, system, or network, documenting the security posture, capabilities, and vulnerabilities against relevant information assurance policies.
- Assist with other projects as required to contribute to efficiency and effectiveness of the organization.
- Travel may be required but should not exceed 10% of work time.
- Work outside the standard office 7.5-hour workday may be required with on-call availability.
This position is not eligible for sponsorship for work authorization now or in the future, including conversion to H1-B visa.
This position has a hybrid work schedule with three days in the office and the option for working remotely two days.
Job duties include contact with other employees and access confidential and proprietary information and/or other items of value, and such access may be supervised or unsupervised. The Company therefore has determined that a review of criminal history is necessary to protect the business and its operations and reputation and is necessary to protect the safety of the Company’s staff, employees, and business relationships.
Formal Education & Certification- Bachelor’s Degree (or foreign equivalent) or in lieu of a degree, at least 12 years in experience in the field of Information Technology or Business (work experience or a combination of education and work experience in the field of Information Technology or Business)
- 8+ years IT experience.
- 6+ years IT security experience
- Minimum 1 year experience with cyber-security investigations and incident response.
- Minimum 1+ years of experience in process analysis and improvement.
- Background in metrics/reporting.
- Experience identifying and implementing solutions to complex business problems.
- Understanding of various operating systems (z/OS, Window, UNIX, Linux, AIX, etc.) with an emphasis on vulnerability assessment and hardening.
- Ability to analyze reports by reviewing incident or threat frequency, severity, and duration data.
- Experience in a Security Operations Center (SOC) or working with a Managed Security Service Provider (MSSP)
- Supervisory and/or Management experience preferred.
- Budgeting experience
- Understand Log Management process and program
- Certifications: Lean, CISSP, SANS GIAC, or CISM
- Project Management concepts: use of JIRA, Planner, etc.
- Delivery of Metrics demonstrating proof of value and key performance indicators
- Understanding of CVSS, CVE, CWE, CPE, CCE, CWE, OVAL, SCAP and/or other standards.
- Familiar with both IT and OT detect and respond functions
- Familiar with email security tools such as Proofpoint, Abnormal Security, O365, etc.
- Understanding of Threat Analysis and Threat Intelligence.
- Experience with Security and Information and Event Monitoring (SIEM) products such as Sumo Logic, Splunk, etc.
- Experience with Vulnerability Management products such as Qualys and WIZ.
- Utilize key performance indicators to track analyst workloads as well as the efficiency of detection signatures/rules and associated monitoring technologies.
- Benchmark and implement industry best practices to mitigate potential threats.
- Support the preparation of appropriate reports and communicate status and results.
- Familiarity with SOC-CMM
- Strong analytical, evaluative, and problem-solving abilities.
- Strong leadership skills
- Ability to motivate in a team-oriented, collaborative environment.
- Ability to set and manage priorities.
- Strong written and oral communication skills.
- Strong interpersonal skills.
- Ability to present ideas in business-friendly and user-friendly language.
- Self-motivated and directed.
- Keen attention to detail.
- Commitment to fostering a culture of inclusion and diversity
- Hybrid on-site and remote work.
- Minimal travel is required.
- Work outside the standard office 7.5-hour workday may occasionally be required for on call coverage or overseeing after hours team investigations.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: CISM CISSP Compliance CSOC CVSS GIAC Governance Incident response Jira Linux Monitoring Qualys SANS SCAP SIEM SOC Splunk Strategy Threat detection Threat intelligence UNIX Vulnerabilities Vulnerability management
Perks/benefits: Career development Health care Team events Travel
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.