Aperio Global
Overview
Join to apply for the
SOC MANAGER (Top Secret Clearance)
role at
Aperio Global .
Aperio Global is seeking a
SOC MANAGER
to support our efforts in
Alexandria, VA . This position requires an active
TOP SECRET
clearance.
Responsibilities & Operations
Oversee the daily operations of the Security Operations Center (SOC), ensuring effective execution of cybersecurity monitoring, detection, response, and reporting activities.
Lead and manage a team of SOC analysts, providing guidance, mentorship, and support on incident detection, triage, escalation, and mitigation processes. Conduct performance assessments and identify professional development opportunities.
Monitor and analyze cybersecurity events to identify anomalies, threats, and potential compromises using SIEM, IDS/IPS, and EDR solutions. Report indicators of compromise while adhering to established escalation protocols.
Manage and coordinate incident response activities, including containment, eradication, and recovery, ensuring proper documentation of actions. Collaborate with internal stakeholders and external constituents during incident response efforts.
Develop, review, and maintain SOC standard operating procedures (SOPs), playbooks, and runbooks to streamline incident response and escalation. Ensure documentation reflects current threats and technologies.
Oversee continuous monitoring of networks, systems, and endpoints to identify and respond to security alerts timely. Optimize tool configurations and automated workflows to improve detection capabilities.
Evaluate security posture by analyzing threat intelligence and attack patterns to identify and mitigate weak points. Lead efforts to adopt cutting‑edge tools and processes.
Ensure timely reporting of SOC‑related events and threat intelligence findings to government leadership and stakeholders. Provide actionable recommendations to strengthen cyber posture.
Conduct SOC team training to enhance response techniques and threat‑hunting skills. Promote awareness and best practices across the organization.
Lead post‑incident reviews to evaluate SOC response effectiveness, identify lessons learned, and integrate improvements into future operations. Provide feedback on performance metrics and resource needs.
Knowledge, Skills, and Abilities
Expertise in incident detection, triage, investigation, escalation, and response processes, including containment, eradication, and recovery.
Proficiency with SIEM, IDS/IPS, EDR, and firewall technologies.
Ability to analyze threat intelligence and identify attack methods, IOCs, and TTPs.
Strong leadership and team‑management skills; proven ability to mentor SOC analysts.
In‑depth knowledge of network architectures, protocols, and operating systems (Windows, Linux, macOS).
Familiarity with cybersecurity frameworks and standards such as NIST, MITRE ATT&CK, ISO 27001.
Skill in developing SOC playbooks, SOPs, and policies to improve operational efficiency.
Effective communication and reporting; can explain complex technical findings to non‑technical stakeholders.
Strong analytical and problem‑solving skills for trend analysis and security data correlation.
Continuous learning mindset; stays current with evolving threats and defensive tools.
Required Qualifications
Active
TOP SECRET
security clearance.
Bachelor’s degree in a technical discipline or equivalent experience (10+ years in cybersecurity operations, analysis, or incident response).
CompTIA Security+ certification.
Certified Information Systems Security Professional (CISSP) certification.
Desired Qualifications
Certified Ethical Hacker (CEH).
GIAC Certified Incident Handler (GCIH).
GIAC Security Operations Certified (GSOC).
CompTIA Advanced Security Practitioner (CASP+).
Certified Information Security Manager (CISM).
AWS Certified Security – Specialty or Microsoft Certified: Azure Security Engineer Associate (relevant for cloud environments).
Cyber Threat Intelligence (CTI) certification or MITRE ATT&CK™ Defender (MAD).
Experience with threat intelligence platforms and integration into SOC operations.
Scripting skills (Python, PowerShell, Bash) for automating SOC tasks and threat detection rules.
Strategic risk‑management and proactive mitigation planning.
Excellent interpersonal and communication skills for real‑time incident updates.
Familiarity with Federal and DoD systems (DISA STIGs, FedRAMP, RMF).
Benefits
Health Care Plan (Medical, Dental & Vision)
Retirement Plan (401k, IRA)
Life Insurance (Basic, Voluntary & AD&D)
Paid Time Off (Vacation, Sick & Public Holidays)
Short Term & Long Term Disability
And more.
Aperio Global is committed to providing equal employment opportunities (EEO) to all employees and applicants. Employment decisions are made without discrimination or harassment, in accordance with applicable federal, state, and local laws. We adhere to all legal requirements prohibiting discrimination based on race, color, religion, sex, national origin, age, disability, genetic information, veteran status, or any other characteristic protected by law.
Job Information
Seniority level: Mid‑Senior level
Employment type: Full‑time
Job function: Other
Industries: Defense and Space Manufacturing
#J-18808-Ljbffr
SOC MANAGER (Top Secret Clearance)
role at
Aperio Global .
Aperio Global is seeking a
SOC MANAGER
to support our efforts in
Alexandria, VA . This position requires an active
TOP SECRET
clearance.
Responsibilities & Operations
Oversee the daily operations of the Security Operations Center (SOC), ensuring effective execution of cybersecurity monitoring, detection, response, and reporting activities.
Lead and manage a team of SOC analysts, providing guidance, mentorship, and support on incident detection, triage, escalation, and mitigation processes. Conduct performance assessments and identify professional development opportunities.
Monitor and analyze cybersecurity events to identify anomalies, threats, and potential compromises using SIEM, IDS/IPS, and EDR solutions. Report indicators of compromise while adhering to established escalation protocols.
Manage and coordinate incident response activities, including containment, eradication, and recovery, ensuring proper documentation of actions. Collaborate with internal stakeholders and external constituents during incident response efforts.
Develop, review, and maintain SOC standard operating procedures (SOPs), playbooks, and runbooks to streamline incident response and escalation. Ensure documentation reflects current threats and technologies.
Oversee continuous monitoring of networks, systems, and endpoints to identify and respond to security alerts timely. Optimize tool configurations and automated workflows to improve detection capabilities.
Evaluate security posture by analyzing threat intelligence and attack patterns to identify and mitigate weak points. Lead efforts to adopt cutting‑edge tools and processes.
Ensure timely reporting of SOC‑related events and threat intelligence findings to government leadership and stakeholders. Provide actionable recommendations to strengthen cyber posture.
Conduct SOC team training to enhance response techniques and threat‑hunting skills. Promote awareness and best practices across the organization.
Lead post‑incident reviews to evaluate SOC response effectiveness, identify lessons learned, and integrate improvements into future operations. Provide feedback on performance metrics and resource needs.
Knowledge, Skills, and Abilities
Expertise in incident detection, triage, investigation, escalation, and response processes, including containment, eradication, and recovery.
Proficiency with SIEM, IDS/IPS, EDR, and firewall technologies.
Ability to analyze threat intelligence and identify attack methods, IOCs, and TTPs.
Strong leadership and team‑management skills; proven ability to mentor SOC analysts.
In‑depth knowledge of network architectures, protocols, and operating systems (Windows, Linux, macOS).
Familiarity with cybersecurity frameworks and standards such as NIST, MITRE ATT&CK, ISO 27001.
Skill in developing SOC playbooks, SOPs, and policies to improve operational efficiency.
Effective communication and reporting; can explain complex technical findings to non‑technical stakeholders.
Strong analytical and problem‑solving skills for trend analysis and security data correlation.
Continuous learning mindset; stays current with evolving threats and defensive tools.
Required Qualifications
Active
TOP SECRET
security clearance.
Bachelor’s degree in a technical discipline or equivalent experience (10+ years in cybersecurity operations, analysis, or incident response).
CompTIA Security+ certification.
Certified Information Systems Security Professional (CISSP) certification.
Desired Qualifications
Certified Ethical Hacker (CEH).
GIAC Certified Incident Handler (GCIH).
GIAC Security Operations Certified (GSOC).
CompTIA Advanced Security Practitioner (CASP+).
Certified Information Security Manager (CISM).
AWS Certified Security – Specialty or Microsoft Certified: Azure Security Engineer Associate (relevant for cloud environments).
Cyber Threat Intelligence (CTI) certification or MITRE ATT&CK™ Defender (MAD).
Experience with threat intelligence platforms and integration into SOC operations.
Scripting skills (Python, PowerShell, Bash) for automating SOC tasks and threat detection rules.
Strategic risk‑management and proactive mitigation planning.
Excellent interpersonal and communication skills for real‑time incident updates.
Familiarity with Federal and DoD systems (DISA STIGs, FedRAMP, RMF).
Benefits
Health Care Plan (Medical, Dental & Vision)
Retirement Plan (401k, IRA)
Life Insurance (Basic, Voluntary & AD&D)
Paid Time Off (Vacation, Sick & Public Holidays)
Short Term & Long Term Disability
And more.
Aperio Global is committed to providing equal employment opportunities (EEO) to all employees and applicants. Employment decisions are made without discrimination or harassment, in accordance with applicable federal, state, and local laws. We adhere to all legal requirements prohibiting discrimination based on race, color, religion, sex, national origin, age, disability, genetic information, veteran status, or any other characteristic protected by law.
Job Information
Seniority level: Mid‑Senior level
Employment type: Full‑time
Job function: Other
Industries: Defense and Space Manufacturing
#J-18808-Ljbffr