Job Description
About our Client
Ready to help build something extraordinary from the ground up? Our client is building a new department that will combine Security Operations Center (SOC) monitoring, Network Operations Center (NOC) monitoring, and Physical Security monitoring.
This greenfield initiative represents a unique chance to join a stable, profitable organization where you will have visibility with IT and other organizational leaders and a career development opportunities to continue growing your leadership skills. Other benefits include:
- Annual Bonus Program
- Low cost medical, dental premiums
- Very generous Paid Time Off
- 401K match plus additional Company Funded Retirement Savings Account (even if you don't contribute to 401K)
- Leadership training program
- Management that is dedicated to your career success and flexible when life happens
- Positive/collaborative work culture
The Role:
As the NOC / SOC Lead, you'll be your Manager's right-hand, leading a team of Operations Analysts in protecting critical infrastructure.
*This role is 8 AM - 5 PM and will be onsite M-F initially.
You'll play a key role in:
- Oversight for network, cyber and physical security monitoring systems
- Mentor and develop junior analysts including KPI management, helping them grow into seasoned professionals
- Serve as the escalation point for complex incidents requiring deep technical expertise
- Coordinate real-time response to security events, network issues, and physical security alerts
- Present to executives on security posture, incidents, and operational improvements
- Drive continuous improvement through root cause analysis and process optimization
You'll work with enterprise-grade tools that matter:
- SIEM Platforms: QRadar, LogRhythm, Splunk, Exabeam, Sentinel or similar
- EDR Solutions: CrowdStrike, Microsoft Defender, SentinelOne or similar
- NDR Solutions: Darktrace, ExtraHop, Vectra AI or similar
- Network Monitoring: Nagios, Splunk, Cisco ASAs, NSXT
- Vulnerability & DLP tools
Key Responsibilities:
- Coordinate incident response across multiple teams
- Compile and analyze security events, ensuring rapid notification to business partners
- Conduct in-depth root cause analysis on critical incidents
- Execute disaster recovery procedures and refine incident response plans
- Automate routine processes using scripting languages (PowerShell, Python)
- Create executive-level reports on security status and operational metrics
- Establish KPIs that matter: uptime percentages, mean time to repair, time to impact assessment
Your Experience:
- 10+ years in technology with deep hands-on experience in network and/or security monitoring systems
- 3+ years of leadership experience with a passion for mentoring diverse teams
- NOC/SOC operations background – you've been in the trenches and know what works
- Production SIEM experience that goes beyond surface level – you can write queries, tune alerts, and optimize detection rules
- Incident management expertise with a track record of managing complex, multi-team responses
- Scripting abilities for automation and efficiency improvements
The Leadership Qualities:
- Mentoring mindset – you genuinely enjoy developing others and watching them succeed
- Communication excellence – you can explain complex technical issues to both analysts and executives
- Collaborative approach – you understand that great security is a team sport
- Adaptability – you thrive in fast-paced environments and can pivot when priorities shift
- Growth orientation – you're excited about building something new and continuously improving
For over 55 years, ComputerPeople has helped IT Professionals take the next step in their career. If this job sounds like you, we have the insight and expertise to help you get the job!