More jobs:
Security Operations Center; SOC Manager Security Clearance
Job in
Seaside, Monterey County, California, 93955, USA
Listed on 2025-12-30
Listing for:
ICF
Full Time
position Listed on 2025-12-30
Job specializations:
-
IT/Tech
Cybersecurity, Security Manager
Job Description & How to Apply Below
ICF is seeking an experienced Security Operations Center (SOC) Manager to support a Defense Human Resources Activity (DHRA) cybersecurity program. In this role, you will oversee 24/7 SOC operations, lead a team of analysts performing detection, triage, and escalation, and ensure effective coordination of incident response activities. The SOC Manager develops playbooks, implements monitoring and reporting procedures, and provides regular situational awareness updates to Government stakeholders to strengthen the agency’s cyber defense posture.
This is for a potential future opportunity. This position will be based onsite in Seaside, CA. What You’ll Do Manage day-to-day SOC operations, ensuring continuous monitoring of DHRA networks and systems for security events and anomalies. Lead SOC analysts performing event detection, triage, escalation, and coordination with incident response teams. Develop, implement, and maintain SOC standard operating procedures (SOPs), playbooks, and escalation protocols.
Ensure timely and accurate analysis of alerts from SIEM, endpoint, and network monitoring tools. Coordinate with cybersecurity, IT operations, and RMF teams to ensure an integrated defense posture and rapid response to incidents. Oversee SOC training programs, ensuring analyst proficiency in threat detection, correlation, and response processes. Conduct root-cause and trend analysis on incidents to identify systemic vulnerabilities and areas for improvement.
Prepare daily, weekly, and monthly operational reports and briefings for Government stakeholders. Advise leadership on emerging threats, attack trends, and SOC performance metrics. Drive continuous improvement of monitoring coverage, use cases, and automation within SOC tools and workflows.
Required Qualifications Bachelor’s degree is required 10 years of experience in cybersecurity operations, analysis, and/or incident response, including at least 3 years in a supervisory or team lead capacity. Active DOD security clearance. US Citizenship required by federal contract. One of the following certifications: CBROPS CFR CySA+ GCFA GCIA GICSP Elastic/Splunk certifications Desired Qualifications Master’s degree in cybersecurity, information systems, or a related technical field.
Demonstrated expertise managing SOC or NOC operations in a DoD or Federal environment.
Experience with SIEM, IDS/IPS, endpoint detection, and incident response tools. Proven ability to coordinate cross-functional teams during incident response and recovery. Experience managing a 24/7 SOC supporting DoD, IC, or federal missions. Familiarity with tools such as Splunk, Arc Sight, Elastic, Tenable, and SOAR platforms. Knowledge of MITRE ATT&CK, DoD Cyber Threat Framework, and NIST 800-61 (Computer Security Incident Handling Guide).
Experience implementing SOC metrics, KPIs, and automation strategies. Strong leadership, communication, and presentation skills, with the ability to brief senior Government officials.
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×