Motion Recruitment
My client, a growing cyber security consulting firm, is looking for a seasoned SOC Manager to lead a federal Network Security Operations Center (NSOC). This role manages 24/7/365 security operations, including incident response, threat analysis, and team oversight. The ideal candidate brings a deep understanding of federal cybersecurity frameworks, excellent leadership skills, and proven experience managing Tier 1–3 analysts in a high-stakes environment.
Key Responsibilities
Oversee daily SOC operations, including proactive threat detection and incident response
Lead and mentor Tier 1–3 SOC analysts to ensure SLAs and operational objectives are met
Develop and maintain Cyber Defense Playbooks and SOC communication protocols
Tune and manage SIEM and IDS/IPS technologies for optimal threat detection
Collaborate with the Client’s OCIO, US-CERT, and other federal cybersecurity stakeholders
Generate executive-level reports, shift summaries, and metrics on incidents and SOC performance
Ensure compliance with NIST 800-61, FISMA, and agency-specific reporting standards
Support threat hunting, forensic investigations, and cyber threat intelligence (CTI) integration
Required Qualifications
Certifications
CISSP or CISM
Microsoft Certified Security Operations Analyst Associate
One of the following GIAC Certifications: GEIR, GCFR, GCFA, GNFA, GCIH, GX-FA, or GLIR
Experience
7+ years in Security Operations, with experience serving as Incident Response Commander or SOC lead on federal programs
Core Skills
Incident response leadership & playbook development
SIEM/IDS/IPS tuning and optimization
GAP analysis and audit preparation
Strong knowledge of federal cybersecurity compliance (NIST, FISMA, etc.)
Seniority level
Mid-Senior level
Employment type
Contract
Job function
Other
Industries
Staffing and Recruiting
#J-18808-Ljbffr
Key Responsibilities
Oversee daily SOC operations, including proactive threat detection and incident response
Lead and mentor Tier 1–3 SOC analysts to ensure SLAs and operational objectives are met
Develop and maintain Cyber Defense Playbooks and SOC communication protocols
Tune and manage SIEM and IDS/IPS technologies for optimal threat detection
Collaborate with the Client’s OCIO, US-CERT, and other federal cybersecurity stakeholders
Generate executive-level reports, shift summaries, and metrics on incidents and SOC performance
Ensure compliance with NIST 800-61, FISMA, and agency-specific reporting standards
Support threat hunting, forensic investigations, and cyber threat intelligence (CTI) integration
Required Qualifications
Certifications
CISSP or CISM
Microsoft Certified Security Operations Analyst Associate
One of the following GIAC Certifications: GEIR, GCFR, GCFA, GNFA, GCIH, GX-FA, or GLIR
Experience
7+ years in Security Operations, with experience serving as Incident Response Commander or SOC lead on federal programs
Core Skills
Incident response leadership & playbook development
SIEM/IDS/IPS tuning and optimization
GAP analysis and audit preparation
Strong knowledge of federal cybersecurity compliance (NIST, FISMA, etc.)
Seniority level
Mid-Senior level
Employment type
Contract
Job function
Other
Industries
Staffing and Recruiting
#J-18808-Ljbffr