NPAworldwide
As the
NOC / SOC Lead , you'll be your Manager's right-hand, leading a team of Operations Analysts in protecting critical infrastructure.
*This role is 8 AM - 5 PM and will be onsite M-F initially.
You'll play a key role in:
Oversight
for network, cyber and physical security monitoring systems Mentor and develop
junior analysts including KPI management, helping them grow into seasoned professionals Serve as the escalation point
for complex incidents requiring deep technical expertise Coordinate real-time response
to security events, network issues, and physical security alerts Present to executives
on security posture, incidents, and operational improvements Drive continuous improvement
through root cause analysis and process optimization You'll work with enterprise-grade tools that matter:
SIEM Platforms:
QRadar, LogRhythm, Splunk, Exabeam, Sentinel or similar EDR Solutions:
CrowdStrike, Microsoft Defender, SentinelOne or similar NDR Solutions:
Darktrace, ExtraHop, Vectra AI or similar Network Monitoring:
Nagios, Splunk, Cisco ASAs, NSXT Vulnerability & DLP tools Key Responsibilities:
Coordinate incident response across multiple teams Compile and analyze security events, ensuring rapid notification to business partners Conduct in-depth root cause analysis on critical incidents Execute disaster recovery procedures and refine incident response plans Automate routine processes using scripting languages (PowerShell, Python) Create executive-level reports on security status and operational metrics Establish KPIs that matter: uptime percentages, mean time to repair, time to impact assessment
NOC / SOC Lead , you'll be your Manager's right-hand, leading a team of Operations Analysts in protecting critical infrastructure.
*This role is 8 AM - 5 PM and will be onsite M-F initially.
You'll play a key role in:
Oversight
for network, cyber and physical security monitoring systems Mentor and develop
junior analysts including KPI management, helping them grow into seasoned professionals Serve as the escalation point
for complex incidents requiring deep technical expertise Coordinate real-time response
to security events, network issues, and physical security alerts Present to executives
on security posture, incidents, and operational improvements Drive continuous improvement
through root cause analysis and process optimization You'll work with enterprise-grade tools that matter:
SIEM Platforms:
QRadar, LogRhythm, Splunk, Exabeam, Sentinel or similar EDR Solutions:
CrowdStrike, Microsoft Defender, SentinelOne or similar NDR Solutions:
Darktrace, ExtraHop, Vectra AI or similar Network Monitoring:
Nagios, Splunk, Cisco ASAs, NSXT Vulnerability & DLP tools Key Responsibilities:
Coordinate incident response across multiple teams Compile and analyze security events, ensuring rapid notification to business partners Conduct in-depth root cause analysis on critical incidents Execute disaster recovery procedures and refine incident response plans Automate routine processes using scripting languages (PowerShell, Python) Create executive-level reports on security status and operational metrics Establish KPIs that matter: uptime percentages, mean time to repair, time to impact assessment