As the NOC / SOC Lead, you'll be your Manager's right-hand, leading a team of Operations Analysts in protecting critical infrastructure. *This role is 8 AM - 5 PM and will be onsite M-F initially. You'll play a key role in:
- Oversight for network, cyber and physical security monitoring systems
- Mentor and develop junior analysts including KPI management, helping them grow into seasoned professionals
- Serve as the escalation point for complex incidents requiring deep technical expertise
- Coordinate real-time response to security events, network issues, and physical security alerts
- Present to executives on security posture, incidents, and operational improvements
- Drive continuous improvement through root cause analysis and process optimization
You'll work with enterprise-grade tools that matter:
- SIEM Platforms: QRadar, LogRhythm, Splunk, Exabeam, Sentinel or similar
- EDR Solutions: CrowdStrike, Microsoft Defender, SentinelOne or similar
- NDR Solutions: Darktrace, ExtraHop, Vectra AI or similar
- Network Monitoring: Nagios, Splunk, Cisco ASAs, NSXT
- Vulnerability & DLP tools
Key Responsibilities: - Coordinate incident response across multiple teams
- Compile and analyze security events, ensuring rapid notification to business partners
- Conduct in-depth root cause analysis on critical incidents
- Execute disaster recovery procedures and refine incident response plans
- Automate routine processes using scripting languages (PowerShell, Python)
- Create executive-level reports on security status and operational metrics
- Establish KPIs that matter: uptime percentages, mean time to repair, time to impact assessment