Overview
On Site
$90 - $115 /hr
Contract - W2
Contract - 6 Month(s)
Skills
Security Operation Center (SOC) Operation Manager
Job Details
Stefanini Group is looking for Security Operations Center (SOC) Manager for a globally recognized company!
For interested applicants, click the apply button or you may reach out to Alfher Hidalgo at / for faster processing. Thank you!
** Hybrid role requires 1-2 days in office**
You will lead and evolve Pure's Cyber Security Operations (SecOps) function for Attack Surface Management (ASM) - integrating discovery, detection, secrets monitoring, and posture governance into a single, outcome-driven capability. Your mission: give the company a real-time, risk-prioritized view of all internal and external exposures and reduce them measurably over time.
You'll lead the front line of exposure reduction - from TLS misconfigs to orphaned assets, misused credentials, SaaS misconfigurations, and risky behavior - using modern detection, Zero Trust enforcement, and automation at scale.
ABOUT THE ROLE
As a senior people and technical leader, you will sit at the intersection of Security Engineering, Infrastructure, Incident Response (CIDR), Cloud, and SaaS App Owners. You'll define strategy, lead execution, and drive visibility across Pure's hybrid environments.
You'll oversee a high-signal tooling stack (Tenable, runZero, CrowdStrike, Obsidian, Zscaler, ArmorCode), ensure detection insights close posture gaps, and partner with IR, GRC, IAM, and Resilience to embed security across the enterprise.
You'll be accountable for metrics like asset coverage, MTTD, MTTC, secrets MTTR, and posture drift - and for creating a repeatable system to track, reduce, and communicate risk effectively.
RESPONSIBILITIES
Lead the ASM function for Pure - developing a unified view of risk across endpoints, cloud, SaaS, and infrastructure
Build, lead, and grow a team of engineers and analysts responsible for asset inventory, secrets hygiene, and vulnerability context
Operate and continuously tune the ASM stack: runZero, Tenable, Obsidian, CrowdStrike, Zscaler ZIA/ZDX, TruffleHog, ArmorCode
Integrate ASM data into Splunk, SOAR, and detection pipelines for real-time telemetry and automated response
Partner with CIDR to enrich IR playbooks with ASM insights and detection triggers
Prioritize vulnerability remediation based on exploitability, business risk, IAM context, and threat intel
Support remediation via SOAR or direct collaboration with Infra, AppSec, and SaaS owners
Lead secret detection and hygiene enforcement in logs, CI/CD pipelines, and shared systems
Maintain posture across SaaS apps like Google Workspace, GitHub, Salesforce, Slack using Obsidian and CASB
Monitor and enforce Zero Trust access controls and user behavior through Zscaler
Own asset lifecycle governance - drive tagging, ownership mapping, TLS hygiene, and segmentation
Develop KPIs that show measurable posture reduction and asset/control coverage
Create dashboards and executive reporting that translates posture metrics into business language
Participate in quarterly control health checks, tabletop scenarios, and red/purple team feedback reviews
Influence product, infrastructure, and risk management through posture-driven findings
REQUIREMENTS
10+ years in cybersecurity, with 5+ years in technical leadership or people management roles
Demonstrated experience leading high-performing teams across security engineering, posture, and operations
Deep expertise operating a security stack including:EDR (e.g., CrowdStrike)Vulnerability Management (e.g., Tenable.io)Asset Discovery (e.g., runZero)SSPM (e.g., Obsidian Security)SIEM (e.g., Splunk)SOAR (e.g., Cortex XSOAR, Tines)Zero Trust & DLP/CASB (e.g., Zscaler ZIA, ZDX)
Hands-on experience remediating risks across Linux, Windows, macOS, and cloud-native platforms (AWS, Azure, Google Cloud Platform)
Strong scripting and automation skills (Python, Bash, PowerShell)
Familiarity with frameworks like MITRE ATT&CK, CIS Top 18, NIST 800-53, and mapping posture to controls
Experience driving accountability across Infra, Cloud, Product Security, IAM, GRC, and IR
A bias for action and comfort working across ambiguity and multiple technical domains
Excellent communicator with the ability to convert security telemetry into executive and engineering insights
PREFERRED QUALIFICATIONS
Experience in SaaS-first or cloud-native companies with fast-paced engineering
Strong understanding of how posture management maps to compliance frameworks (SOC 2, PCI, HIPAA)
Certifications: CISSP, GCIH, OSCP, AWS Security Specialty, or equivalent
Experience integrating ASM and telemetry into SOAR or automated IR workflows
Exposure to modern security data modeling and dashboarding (ArmorCode, Splunk, or custom BI)
#LI-AH1#LI-HYBRID
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.