Manager, Cyber Security Operations Center

Manager, Cyber Security Operations Center
AZ - Phoenix

Job Description

Role Summary:
The Security Operations Center Manager will lead the team providing proactive 24x7 monitoring of the information environment to detect, analyze, track and mitigate external threats utilizing a multi-tenant security information and event management system (SIEM) and other tools used to provide managed security services. You will provide oversight and direction of the Security Operation Center team monitoring All Covered client networks and systems. The SOC Manager is also responsible for the management of the SOC team, its compliance to processes and procedures, interaction and escalation with 3rd parties, alignment to emerging threats and incident trends and ensuring case handling through remediation of the Network Operation Center (NOC), Remote Support Center (RSC) and field engineering personnel.

Duties and Essential Role Functions:

  • Manage a team starting with of analysts with a primary mission to proactively prevent incidents and ensure quality and adherence to client SLAs.
  • Help employees realize their potential by setting clear expectations, openly evaluating performance, upholding accountability , and providing challenges (within and outside their team) to stretch employees' skills.
  • Develop training plans, for analysts, which include effective communication, technical skills and response abilities.

  • Align team's goals and. plan with company's long term priorities and strategy.
  • Work with other teams to identify shared goals and partners to achieve those goals efficiently.
  • Manage project goals, plans and risks, holds team accountable on achieving agreed goals.
  • Mentor analysts throughout their development.

  • Provide oversight of analysis activities and direct the activities of the team to ensure the effective resolution
  • Should a security incident occur, efficiently orchestrate analysts and or escalation to respond
  • Contribute to the development of Attack Analysis standard operating procedures to ensure that they stay current and effective
  • Deliver assessments to senior leadership and recommend course of action to be undertaken
  • Manage and improve information security documentation as required
  • Help analyze findings in investigative matters, and develop fact based reports of events over period of time

    Job Requirements


  • This role will have supervisory responsibilities. As such, the individual must have a minimum of five years ' experience in the area of people management.
  • 7+ year's Cyber Security Incident Response, Security Operations Center and/or Attack Analysis in a large, mission-critical environment with a background in the following:
    -In-depth knowledge of network intrusion methods, network containment and segregation techniques
    -In-depth knowledge of operating systems (Windows & UNIX, Mac OS X a plus)
    -Expert understanding of TCP/IP networking, routing protocols and full packet capture analysis
    -In-depth network security expertise including firewall, IDS and IPS
    -Experience building baselines of network activity for use in anomaly detection
    -Experience with proactive threat hunting techniques and concepts in an enterprise environment.
    -Experience with reviewing raw log files, data correlation, and analysis (i.e.
    firewall, network flow , IDS, system logs)
    -Knowledge of enterprise systems and infrastructure
    -Proven understanding of log parsing and analysis at a large scale with data clustering tools or techniques
    -Experience with a scripting language such as Perl, Ruby, Python, and BASH
  • Bachelor's Degree in Computer Science or related field
  • Master's Degree in Engineering , Business Management, or Technology related fields a major plus

    People skills:
  • Ability to coordinate, work with and gain the trust of business stakeholders, technical resources, and third-party vendors.
  • Able to work under pressure in time critical situations.

    Process Skills:
  • Strong attention to detail in conducting forensic analysis combined with an ability to accurately record full documentation in support of the investigation.
  • Detailed knowledge of current international best practices in the incident response arena.

    Communication Skills:
  • Excellent written and verbal communication skills are required.
  • Ability to communicate effectively with business representatives in explaining impacts and strategies and where necessary, in layman's terms.

  • Industry standard information security and incident response certifications (CISSP, GCIA, GCIH, GREM, etc.) are a plus.
  • Memberships and participation in relevant professional associations.

    Konica Minolta offers:
  • Competitive compensation program.
  • Outstanding benefits package (including medical, dental, life insurance).
  • 401(k) plan with matching company contribution.
  • Excellent holiday/vacation plans.
  • Tuition reimbursement.
  • Employee Referral Bonus Program.
  • Ongoing training opportunities.
  • Visible, exciting work supporting the sales of cutting edge technology and workflow solutions.

    KMBS is an equal opportunity and affirmative action employer. We consider all qualified applicants for employment without regard to race, color, religion, creed, national origin, sex, pregnancy, age, sexual orientation, transgender status, gender identity, disability, alienage or citizenship status, marital status or partnership status, genetic information, veteran status or any other characteristic protected under applicable law.

  • Apply Now
    What to expect next.
    + Need Help with the Application Process?
    Konica Minolta endeavors to make this site accessible to any and all end users. If you need accessibility assistance applying for open positions, please call our recruiting department at 201-934-5200. This contact information is for accommodation requests only and cannot be used to inquire about your application status.
    © 2017 Konica Minolta Business Solutions U.S.A.,Inc. All rights reserved.