Overview
Skills
Job Details
Position Overview
Our client is a publicly traded, globally recognized technology and manufacturing organization focused on delivering secure, high-precision products and advanced digital security solutions. They support major global brands across financial services, technology, and emerging digital sectors.
They are seeking a Manager, Cybersecurity to lead core security operations, including SOC oversight, vulnerability management, DFIR, threat intelligence integration, partner management, and red team coordination. This is not a checkbox role it is a hands-on leadership position responsible for ensuring defenses are effective, partners deliver measurable value, and the organization's security posture remains resilient and adaptive.
This role requires working on-site five days per week in Somerset, NJ.
Key Responsibilities
SOC & Security Operations
- Oversee day-to-day SOC operations, including monitoring, alert triage, and escalation
- Manage MSSP/MDR partnerships, ensuring quality, accountability, and outcome-driven performance
- Ensure continuous coverage through strong playbook design, automation, and partner integration
Vulnerability Management
- Own the full vulnerability lifecycle: scanning, prioritization, remediation coordination, and reporting
- Collaborate with IT and DevOps to ensure durable remediation not just ticket closure
- Deliver clear enterprise risk posture updates and trend analyses to senior leadership
Threat Intelligence & Red Teaming
- Lead red and purple team planning, coordination, and post-engagement actioning
- Integrate Cyber Threat Intelligence (CTI) into SOC workflows, including IOCs, TTPs, and emerging threat signals
- Conduct proactive threat hunting aligned with MITRE Telecommunication&CK and relevant intelligence
Security Tooling & AI/ML
- Deploy, maintain, and optimize enterprise security tools (SIEM, EDR, WAF, scanners, SOAR, etc.)
- Ensure tools are properly tuned, integrated, and delivering measurable operational value
- Explore and evaluate AI/ML use cases for anomaly detection and automation to improve security outcomes
Digital Forensics & Incident Response (DFIR)
- Lead end-to-end investigations across endpoints, servers, cloud environments, and OT/ICS when needed
- Conduct tabletop exercises, refine IR playbooks, and strengthen readiness across teams
- Mentor analysts in forensics, hunting, and incident response best practices
Team Development & Coaching
- Provide consistent coaching, feedback, and growth opportunities for SOC analysts and security team members
- Foster a culture of continuous learning, technical mastery, and operational excellence
- Encourage autonomy, ownership, and accountability across security operations
Qualifications
Required
- 7+ years in cybersecurity operations, including 3+ years in a senior or leadership role
- Demonstrated SOC management experience, including MSSP oversight
- Proven ability to manage vulnerabilities across hybrid (on-prem + cloud) environments
- Hands-on experience with SIEM and EDR platforms
- Strong DFIR capabilities: log analysis, memory forensics, packet capture review, endpoint investigations, and threat hunting
- Experience coordinating red team engagements and operationalizing their findings
- Excellent communication skills, capable of briefing executives and mentoring junior staff
Preferred
- Experience in analyzing and integrating cyber threat intelligence
- Cloud security operations experience in AWS or Azure
- Certifications such as GCIA, GCFA, GCIH, CISSP, or CISM
- Experience in financial services, manufacturing, or other high-assurance industries