SOC Team Manager Position Available In Miami-Dade, Florida
Tallo's Job Summary: We are seeking a SOC Team Manager/Lead for a remote contract position, offering $50.00 - $60.00 USD hourly. Responsibilities include leading incident response, mentoring analysts, and enhancing security processes. Qualifications: 5+ years SOC experience, knowledge of frameworks like NIST, and proficiency in security tools and scripting languages. Contact skhan03@judge.com for more information.
Job Description
Location:
REMOTE Salary:
$50.00 USD Hourly – $60.00
USD Hourly Description:
Title :
Soc Team Manager/SOC Team Lead Location :
Remote Contract | 3+ Months Job Description We are looking for a highly skilled and motivated SOC Team Lead to join our cybersecurity team. This individual will oversee day to day operations ensuring effective detection, investigation, and response to cybersecurity threats. The SOC Team Lead will mentor analysts, optimize security processes, and collaborate with cross-functional teams to strengthen the organization’s security posture. The ideal candidate has experience working in a SOC environment and is eager to contribute to the development of a new cybersecurity organization. Join us to build and shape a new cybersecurity organization and address cutting-edge security challenges.
Key Responsibilities:
Lead investigation, analysis, and response to cybersecurity incidents. Mentor and coach L1 and L2 SOC analysts, fostering professional growth and knowledge sharing. Perform root cause analysis and provide recommendations for remediation. Ensure that all identified events are promptly validated and thoroughly investigated. Provide timely advice and guidance on the response action plans for events and incidents based on incident type and severity. Develop and refine incident response playbooks and procedures. Collaborate with cross-functional teams to improve security posture. Stay current with emerging threats, vulnerabilities, and attack techniques. Work closely with Threat Intelligence teams to stay ahead of emerging threats and incorporate intelligence into SOC operations. Assist in developing and enhancing automation capabilities (including SOAR). Develop and tune security alerts, detection rules, and use cases. Collaborate with SOC engineers to enhance threat detection capabilities. Conduct threat-hunting activities to proactively identify potential threats.
Qualifications and Experience:
Minimum of 5 years of experience in a SOC or related cybersecurity role. Strong knowledge of incident response methodologies and frameworks (e.g., NIST, MITRE ATT&CK). Hands-on experience with security tools such as SIEM (Sentinel, Qradar, etc.), EDR (CrowdStrike, Defender) Proficiency in scripting languages (Python, PowerShell) for automation. Familiarity with cloud security environments (AWS, Azure, GCP). Proven leadership experience, with the ability to mentor and develop SOC analysts. Excellent communication and collaboration abilities. Strong analytical and problem-solving skills. Relevant certifications such as CISSP, GCIA, GCIH, CEH, or equivalent are a plus. By providing your phone number, you consent to: (1) receive automated text messages and calls from the Judge Group, Inc. and its affiliates (collectively “Judge”) to such phone number regarding job opportunities, your job application, and for other related purposes. Message & data rates apply and message frequency may vary. Consistent with Judge’s Privacy Policy, information obtained from your consent will not be shared with third parties for marketing/promotional purposes. Reply STOP to opt out of receiving telephone calls and text messages from Judge and HELP for help.
Contact:
skhan03@judge.com This job and many more are available through The Judge Group. Find us on the web at www.judge.com