Logo
Aperio Global

SOC MANAGER (Top Secret Clearance)

Aperio Global, Alexandria, Virginia, us, 22350

Save Job

Overview Join to apply for the

SOC MANAGER (Top Secret Clearance)

role at

Aperio Global .

Aperio Global is seeking a

SOC MANAGER

to support our efforts in

Alexandria, VA . This position requires an active

TOP SECRET

clearance.

Responsibilities & Operations

Oversee the daily operations of the Security Operations Center (SOC), ensuring effective execution of cybersecurity monitoring, detection, response, and reporting activities.

Lead and manage a team of SOC analysts, providing guidance, mentorship, and support on incident detection, triage, escalation, and mitigation processes. Conduct performance assessments and identify professional development opportunities.

Monitor and analyze cybersecurity events to identify anomalies, threats, and potential compromises using SIEM, IDS/IPS, and EDR solutions. Report indicators of compromise while adhering to established escalation protocols.

Manage and coordinate incident response activities, including containment, eradication, and recovery, ensuring proper documentation of actions. Collaborate with internal stakeholders and external constituents during incident response efforts.

Develop, review, and maintain SOC standard operating procedures (SOPs), playbooks, and runbooks to streamline incident response and escalation. Ensure documentation reflects current threats and technologies.

Oversee continuous monitoring of networks, systems, and endpoints to identify and respond to security alerts timely. Optimize tool configurations and automated workflows to improve detection capabilities.

Evaluate security posture by analyzing threat intelligence and attack patterns to identify and mitigate weak points. Lead efforts to adopt cutting‑edge tools and processes.

Ensure timely reporting of SOC‑related events and threat intelligence findings to government leadership and stakeholders. Provide actionable recommendations to strengthen cyber posture.

Conduct SOC team training to enhance response techniques and threat‑hunting skills. Promote awareness and best practices across the organization.

Lead post‑incident reviews to evaluate SOC response effectiveness, identify lessons learned, and integrate improvements into future operations. Provide feedback on performance metrics and resource needs.

Knowledge, Skills, and Abilities

Expertise in incident detection, triage, investigation, escalation, and response processes, including containment, eradication, and recovery.

Proficiency with SIEM, IDS/IPS, EDR, and firewall technologies.

Ability to analyze threat intelligence and identify attack methods, IOCs, and TTPs.

Strong leadership and team‑management skills; proven ability to mentor SOC analysts.

In‑depth knowledge of network architectures, protocols, and operating systems (Windows, Linux, macOS).

Familiarity with cybersecurity frameworks and standards such as NIST, MITRE ATT&CK, ISO 27001.

Skill in developing SOC playbooks, SOPs, and policies to improve operational efficiency.

Effective communication and reporting; can explain complex technical findings to non‑technical stakeholders.

Strong analytical and problem‑solving skills for trend analysis and security data correlation.

Continuous learning mindset; stays current with evolving threats and defensive tools.

Required Qualifications

Active

TOP SECRET

security clearance.

Bachelor’s degree in a technical discipline or equivalent experience (10+ years in cybersecurity operations, analysis, or incident response).

CompTIA Security+ certification.

Certified Information Systems Security Professional (CISSP) certification.

Desired Qualifications

Certified Ethical Hacker (CEH).

GIAC Certified Incident Handler (GCIH).

GIAC Security Operations Certified (GSOC).

CompTIA Advanced Security Practitioner (CASP+).

Certified Information Security Manager (CISM).

AWS Certified Security – Specialty or Microsoft Certified: Azure Security Engineer Associate (relevant for cloud environments).

Cyber Threat Intelligence (CTI) certification or MITRE ATT&CK™ Defender (MAD).

Experience with threat intelligence platforms and integration into SOC operations.

Scripting skills (Python, PowerShell, Bash) for automating SOC tasks and threat detection rules.

Strategic risk‑management and proactive mitigation planning.

Excellent interpersonal and communication skills for real‑time incident updates.

Familiarity with Federal and DoD systems (DISA STIGs, FedRAMP, RMF).

Benefits

Health Care Plan (Medical, Dental & Vision)

Retirement Plan (401k, IRA)

Life Insurance (Basic, Voluntary & AD&D)

Paid Time Off (Vacation, Sick & Public Holidays)

Short Term & Long Term Disability

And more.

Aperio Global is committed to providing equal employment opportunities (EEO) to all employees and applicants. Employment decisions are made without discrimination or harassment, in accordance with applicable federal, state, and local laws. We adhere to all legal requirements prohibiting discrimination based on race, color, religion, sex, national origin, age, disability, genetic information, veteran status, or any other characteristic protected by law.

Job Information

Seniority level: Mid‑Senior level

Employment type: Full‑time

Job function: Other

Industries: Defense and Space Manufacturing

#J-18808-Ljbffr