Security Operations Center (SOC) Manager

  • Santa Clara, CA
  • Posted 6 hours ago | Updated 3 hours ago

Overview

On Site
$90 - $115 /hr
Contract - W2
Contract - 6 Month(s)

Skills

Security Operation Center (SOC) Operation Manager

Job Details


Stefanini Group is looking for Security Operations Center (SOC) Manager for a globally recognized company!

For interested applicants, click the apply button or you may reach out to Alfher Hidalgo at / for faster processing. Thank you!



** Hybrid role requires 1-2 days in office**





You will lead and evolve Pure's Cyber Security Operations (SecOps) function for Attack Surface Management (ASM) - integrating discovery, detection, secrets monitoring, and posture governance into a single, outcome-driven capability. Your mission: give the company a real-time, risk-prioritized view of all internal and external exposures and reduce them measurably over time.

You'll lead the front line of exposure reduction - from TLS misconfigs to orphaned assets, misused credentials, SaaS misconfigurations, and risky behavior - using modern detection, Zero Trust enforcement, and automation at scale.





ABOUT THE ROLE

As a senior people and technical leader, you will sit at the intersection of Security Engineering, Infrastructure, Incident Response (CIDR), Cloud, and SaaS App Owners. You'll define strategy, lead execution, and drive visibility across Pure's hybrid environments.

You'll oversee a high-signal tooling stack (Tenable, runZero, CrowdStrike, Obsidian, Zscaler, ArmorCode), ensure detection insights close posture gaps, and partner with IR, GRC, IAM, and Resilience to embed security across the enterprise.

You'll be accountable for metrics like asset coverage, MTTD, MTTC, secrets MTTR, and posture drift - and for creating a repeatable system to track, reduce, and communicate risk effectively.





RESPONSIBILITIES

Lead the ASM function for Pure - developing a unified view of risk across endpoints, cloud, SaaS, and infrastructure

Build, lead, and grow a team of engineers and analysts responsible for asset inventory, secrets hygiene, and vulnerability context

Operate and continuously tune the ASM stack: runZero, Tenable, Obsidian, CrowdStrike, Zscaler ZIA/ZDX, TruffleHog, ArmorCode

Integrate ASM data into Splunk, SOAR, and detection pipelines for real-time telemetry and automated response

Partner with CIDR to enrich IR playbooks with ASM insights and detection triggers

Prioritize vulnerability remediation based on exploitability, business risk, IAM context, and threat intel

Support remediation via SOAR or direct collaboration with Infra, AppSec, and SaaS owners

Lead secret detection and hygiene enforcement in logs, CI/CD pipelines, and shared systems

Maintain posture across SaaS apps like Google Workspace, GitHub, Salesforce, Slack using Obsidian and CASB

Monitor and enforce Zero Trust access controls and user behavior through Zscaler

Own asset lifecycle governance - drive tagging, ownership mapping, TLS hygiene, and segmentation

Develop KPIs that show measurable posture reduction and asset/control coverage

Create dashboards and executive reporting that translates posture metrics into business language

Participate in quarterly control health checks, tabletop scenarios, and red/purple team feedback reviews

Influence product, infrastructure, and risk management through posture-driven findings



REQUIREMENTS

10+ years in cybersecurity, with 5+ years in technical leadership or people management roles

Demonstrated experience leading high-performing teams across security engineering, posture, and operations

Deep expertise operating a security stack including:EDR (e.g., CrowdStrike)Vulnerability Management (e.g., Tenable.io)Asset Discovery (e.g., runZero)SSPM (e.g., Obsidian Security)SIEM (e.g., Splunk)SOAR (e.g., Cortex XSOAR, Tines)Zero Trust & DLP/CASB (e.g., Zscaler ZIA, ZDX)

Hands-on experience remediating risks across Linux, Windows, macOS, and cloud-native platforms (AWS, Azure, Google Cloud Platform)

Strong scripting and automation skills (Python, Bash, PowerShell)

Familiarity with frameworks like MITRE ATT&CK, CIS Top 18, NIST 800-53, and mapping posture to controls

Experience driving accountability across Infra, Cloud, Product Security, IAM, GRC, and IR

A bias for action and comfort working across ambiguity and multiple technical domains

Excellent communicator with the ability to convert security telemetry into executive and engineering insights





PREFERRED QUALIFICATIONS

Experience in SaaS-first or cloud-native companies with fast-paced engineering

Strong understanding of how posture management maps to compliance frameworks (SOC 2, PCI, HIPAA)

Certifications: CISSP, GCIH, OSCP, AWS Security Specialty, or equivalent

Experience integrating ASM and telemetry into SOAR or automated IR workflows

Exposure to modern security data modeling and dashboarding (ArmorCode, Splunk, or custom BI)



#LI-AH1#LI-HYBRID




Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.