Information Security SOC Manager
Job in
Salt Lake City, Salt Lake County, Utah, 84193, USA
Listed on 2026-01-20
Listing for:
Deseret Mutual Benefit Administrators (DMBA)
Full Time
position Listed on 2026-01-20
Job specializations:
-
IT/Tech
Cybersecurity, Information Security, IT Consultant, IT Project Manager
Job Description & How to Apply Below
DMBA provides a variety of benefits including health, life, and retirement to employees of the Church of Jesus Christ of Latter‑day Saints and its affiliates. DMBA began operations in 1970 and is now in its 55th year of supporting the Church of Jesus Christ of Latter‑day Saints and its mission.
Position SummaryDMBA is looking for an Information Security SOC Manager to join the Information Security Team. The Information Security Team reports to the Chief Technology Officer and is responsible for the Information security program. This role will oversee the implementation, performance, and management of the security operations center as well as the identity and access management team.
Responsibilities- Oversee the day‑to‑day operations of the security operations center including baselining, performance metrics, reporting, team development, tool evaluation, and incident investigation and escalation
- Oversee the day‑to‑day operations of the identity and access management strategy including performance metrics, reporting, team development, tool evaluation, and other identity governance initiatives
- Maintain and optimize SIEM, SOAR, EDR, and vulnerability management tools
- Develop, test, and refine incident response playbooks and escalation procedures
- Drive threat hunting, intelligence integration, and proactive detection initiatives
- Participate in the selection of new technologies and solutions to address gaps in the SOC and IAM strategy
- Partner with IT and business teams to implement various security technologies in alignment with a multi‑year information security framework
- Oversee IAM lifecycle processes including provisioning, de‑provisioning, role‑based access control (RBAC), privileged access management (PAM), and multi‑factor authentication (MFA)
- Ensure compliance with identity governance policies and regulatory frameworks (HIPAA, HITRUST, SOC 2, NIST, ISO 27001)
- Partner with HR, IT, and application owners to streamline identity processes and enforce least privilege and zero‑trust principles
- Manage IAM platforms (e.g., Microsoft Entra, Okta, Crowd Strike Identity Threat Protection, Cyber Ark, etc.) and support integration with enterprise applications
- Lead various security initiatives and projects to address gaps and continuously improve security operations
- Support the development of policy, risk management, and compliance requirements by applying technical expertise
- Evaluate and consult with IT and business teams on new and emergent technologies to support innovation while appropriately managing risk
- Review latest threat intelligence for emergent threat actors and vectors to improve and respond to imminent threats
- Lead, mentor, and develop a team of SOC analysts/engineers and IAM engineers
- Collaborate with compliance, risk, and IT teams to ensure security operations and identity practices meet audit and regulatory requirements
- Contribute to strategic planning for security architecture, risk management, and zero‑trust initiatives
- Provide executive reporting on security posture, IAM metrics, and incident response readiness
- Prioritize team tasks and evaluate the performance of team members, tooling, and operational efficiency
- Be an active participant in building the Information security program by evaluating and suggesting new solutions and ideas and championing the information security program
- 4-year Bachelor's degree or Master's degree (preferred)
- 7‑10 years of technical IT and information security experience
- 1‑3 years of technical leadership or mentoring experience
- CISM, GIAC, CISSP, OSCP, Microsoft Engineer, Microsoft Architect, AWS Security, or equivalent information security training and expertise
- Strong understanding of information security best practices and security frameworks (NIST CSF, ISO 27001, ISO
27005, CIS Controls, HITRUST, etc.) - Experience with HIPAA, DOL Information security best practices, international, federal, and state privacy laws
- Deep knowledge of databases, common operating systems (Windows/Linux), networking, application, and cloud environments
- Deep knowledge of security solutions (SIEM, SOAR, Firewall, WAF, Vulnerability Scanning, XDR, endpoint, PAM, etc.)
- Experience…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×