Overview
On Site
$50 - $70
Contract - W2
Contract - Independent
Contract - 12 Month(s)
Skills
SIEM
SOC
Job Details
- Lead and collaborate with offshore SOC analysts and incident responders, managing daily monitoring, triage, and escalation processes.
- Manage 24x7 operational coverage by the MSSP and ensure adherence to SLAs and response timelines
- Oversee operation and optimization of SIEM, SOAR, and endpoint detection/response (EDR) platforms.
- Direct incident detection, investigation, and coordinated response across IT and business units.
- Coordinate incident analysis, containment, eradication, and recovery activities.
- Serve as the escalation point for critical security events and executive communications.
- Develop and maintain incident response playbooks and ensure integration with IR, vulnerability management, and threat hunting programs.
- Collaborate with the IR and IT teams to ensure forensic evidence handling and post-incident reviews.
- Lead threat hunting, forensic investigations, and root-cause analysis to prevent recurrence of incidents.
- Collaborate with governance, risk, and compliance (GRC) teams to meet regulatory and framework requirements (e.g., NIST CSF 2.0, ISO 27001, NYCRR 500).
- Develop, maintain and report security metrics and dashboards (MTTD, MTTR, incident trends) for executive leadership and risk committees.
- Drive continuous improvement by evaluating tools, automation, and processes to strengthen SOC maturity.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.