Overview
Security Operations Center/SOC Lead Jobs in Greendale, Wisconsin, USA at NTG
Title: Security Operations Center/SOC Lead
Company: NTG
Location: Greendale, Wisconsin, USA
Type: Full Time
Category: IT/Tech, Security
Position: Security Operations Center (SOC) Lead
NTGExplore NTG, a premier IT consulting & cybersecurity solutions provider, and step into a world where
innovation
meets security.
The SOC Lead is responsible for managing and overseeing the operations of NTG’s Security Operations Center (SOC). The position requires a minimum of 5 years’ experience or experience and a related degree in IT or Cybersecurity. This role involves leading a team of SOC Analysts in detecting, analyzing, and responding to cyber threats, vulnerabilities, and insider threats. The SOC Lead plays a critical role in ensuring the security of customer systems by performing advanced cyber threat analysis, coordinating incident responses, and refining security procedures and strategies.
This role is essential for ensuring the integrity and security of NTG’s systems and data. If you are passionate about cybersecurity and possess strongleadershipandanalytical skills, we encourage you to apply.
Key Attributes:
Detail-oriented with a proactive approach to threat detection and mitigation.
Ability to adapt to new technologies and evolving threat landscapes.
A team player with a strong focus oncollaborationandcontinuous improvement.
Essential Duties and Responsibilities
The essential functions include, but are not limited to the following:
SOC Management andLeadership:
Oversee day-to-day operations of the SOC and ensure optimal team performance.
Lead and mentor SOC Analysts, providing guidance on threat detection, incident response, and use of security tools.
Manage and prioritize security incidents and escalate critical issues, as necessary.
Perform advanced threat analysis to identify, assess, and mitigate cyber threats and vulnerabilities.
Conduct insider threat investigations and develop strategies to prevent unauthorized access or misuse.
Coordinate and execute comprehensive incident response plans during security breaches or cyberattacks.
Procedure and Playbook Development:
Develop and refine SOC procedures, playbooks, and response strategies to improve operational efficiency.
Ensure documentation of processes and lessons learned from incident response activities.
Reporting and Trend Analysis:
Analyze and report on security trends, vulnerabilities, and incidents.
Provide recommendations to enhance detection capabilities and mitigate security risks.
Collaboration and Coordination:
Work closely with other teams, such as IT, engineering, and compliance, to address and mitigate security risks.
Act as a liaison between the SOC andleadership, providing updates on the security landscape.
Minimum Qualifications (Knowledge, Skills, and Abilities)
Technical Expertise:
Strong understanding of cyber threats, vulnerabilities, and attack vectors.
Expertise using, customizing, and tuning Splunk.
Expertise in security tools such as SIEM, IDS/IPS, EDR, firewalls, and forensic tools.
Familiarity with frameworks like MITRE ATT&CK, NIST, and ISO 27001.
Proficiency in scripting and automation for SOC processes (e.g., Python, Power Shell).
Proven ability to lead and manage teams in a high-pressure environment.
Strongmentoring and coachingcapabilities to develop team members’ skills.
Analytical andProblem-Solving:
Excellentanalytical skillsto perform detailed cyber threat and vulnerability assessments.
Ability to prioritize and make quick decisions during critical incidents.
Strong written and verbalcommunication sk…