Logo
Louisiana Staffing

SOC Team Lead - FedRAMP

Louisiana Staffing, Baton Rouge, Louisiana, us, 70873

Save Job

Security Operations Incident Response Team Lead

The Information Security organization advances the overall state of security at Rubrik through purposeful initiatives and coordination of large security projects. Information Security builds technologies, tools, and processes to better enable teams at Rubrik to develop secure software and protect data and systems with appropriate security controls. Information Security also develops systems to monitor and respond to attacks against our systems, provides awareness education to teams on security best practices for data protection, and ensures data sharing relationships with third parties in order to securely protect Rubrik information. Rubrik's Security Operations Center (SOC) team is responsible for threat detection and incident response. This includes monitoring, triaging, and escalating security alerts from across the enterprise. The SOC is the first to respond to cyber security incidents, report on cyber threats, and drive changes needed to protect the organization. As the Security Operations Incident Response Team Lead, FedRAMP you will be responsible for leading and mentoring a team of incident responders, overseeing the full lifecycle of security incidents from detection to resolution, and ensuring all activities adhere to stringent FedRAMP requirements. This role demands a deep understanding of incident response methodologies, security technologies, and the ability to operate effectively within a highly regulated environment. Lead and act as the primary investigator during incident response (IR) activities, leveraging expertise in enterprise forensics. Ensure all IR investigations are prioritized, escalated properly, and are consistently thorough, accurate, and complete. Investigate escalated security alerts across Rubrik's corporate network, endpoints, cloud, and SaaS environments. Collaborate with cross-functional teams to drive the timely resolution of IR investigations and response actions. Develop and execute regular exercises to continuously improve the team's incident response capabilities. Maintain accurate incident case attributes and detailed investigation documentation. Oversee the entire vulnerability management lifecycle, including scanning, assessment, prioritization, tracking, and remediation efforts across FedRAMP authorized systems. Analyze threats and vulnerabilities to accurately determine their criticality and risk. Collaborate with the CTI team to identify, document, and report on information security (InfoSec) threats and emerging trends discovered during incident response activities. Lead after-action reviews and post-mortems to identify areas for improvement and implement lessons learned. Guide and train junior analysts, serving as an escalation point for complex investigations and process questions. Contribute to overall program maturity by providing feedback and ideas to refine and enhance detection capabilities and response processes. 8+ years of progressive experience in cybersecurity, with at least 2+ years specifically in a security incident response leadership role. Strong technical expertise in security technologies such as SIEM (Sentinel, Splunk, QRadar, etc.), EDR (CrowdStrike, SentinelOne, etc.), network intrusion detection/prevention systems (IDS/IPS), firewalls, and cloud security tools. Deep understanding of incident response methodologies (e.g., NIST, SANS). Demonstrable experience working in environments subject to FedRAMP compliance (e.g., experience with NIST SP 800-53, FedRAMP controls, JAB/Agency ATO processes). Excellent analytical, problem-solving, and decision-making skills under pressure. Strong communication (written and verbal) and interpersonal skills, with the ability to effectively communicate complex technical information to both technical and non-technical audiences. Ability to work independently and as part of a team in a fast-paced, dynamic environment. Relevant security certifications (e.g., CISSP, GCIH, GCFA, CCNP Security, GCP/AWS/Azure Security certifications). Certifications related to vulnerability management or penetration testing (e.g., CompTIA PenTest+, OSCP, CEH) are a plus. Experience with Security Orchestration, Automation, and Response (SOAR) platforms. Familiarity with various cloud service providers (AWS, Azure, GCP) and their security offerings. Proficiency in scripting languages (e.g., Python, PowerShell) for automation and analysis. Experience with digital forensic analysis artifacts, techniques and tools. Knowledge of compliance frameworks beyond FedRAMP (e.g., HIPAA, PCI-DSS, ISO 27001).