user avatar

Security Operations Center (SOC) Manager

Zachary Piper Solutions, LLC

Today
Secret
Unspecified
Unspecified
Washington, DC (On-Site/Office)

Zachary Piper Solutions is seeking a SOC Manager to support a program expected to be awarded in September 2026. This is a 5 year program supporting cleared work located in Washington, DC. The SOC Manager will be responsible for leading Cyber Security and Incident Response operations supporting the Federal Communications Commission. This position requires a Secret Clearance and will be able to upgrade to a Top Secret.

Responsibilities for the SOC Manager:

• Oversee a 24/7/365 Security Operations Center and act as overall Chief engaging directly with the federal client, building out the SOC team, and ensuring secure monitoring of all FCC security channels

• Conduct GAP Analysis reviews, direct response teams, ensure NIST compliance, and manage processes and procedures.

• Lead threat hunting and vulnerability assessment activities, maintain SOC communication plans and defense playbooks, and investigate high level alerts and root cause analysis.

Required Qualifications for the SOC Manager include:

• 7+ years of experience with SOC Operations and Managerial Roles

• Active Certifications: CISSP, GIAC Incident Response, and Microsoft Certified Security Operations Analyst

• Active Secret or Top Secret Clearance

• Bachelor's Degree

Compensation for the SOC Manager include:

• Salary: $150,000-200,000 **Depending on experience**

• Benefits: Cigna Medical, Dental, Vision, 401k, PTO, Holidays, Sick leave as required by law

The job was posted on 8/18 and will accept applicants for 30 days.

Keywords: Cleared, clearable, dod cleared, dod secret, dod clearance, secret clearance, ts, tssci, ts/sci, top secret clearance, top secret, secretclearance, secret, secret dod, dos secret, secret dos, top secret sci, top secret with sci, federally cleared, ts sci, active ts, active secret, active clearance, clearance active, sci eligible, sci eligibility, active top secret, dod clearance, active dod, active security, security clearance, veterans, reserve, reserves, reserve member, civilian, marine corp, marines, marine corps, active duty, retired military, military, army, navy, air force, us army, us navy, us air force, usmc, untied states service member, department of defense, dod, department of state, federal agency, federal contract, public sector, long term contracts, Top secret, topsecret, ts, tssci, ts/sci, ts sci, DC, district of columbia, washington dc, washingtondc, DMV, md, va, maryland, virginia, washington, SOC Manager, Security Operations Center, cybersecurity, incident response, threat detection, threat intelligence, SIEM, Splunk, QRadar, LogRhythm, ArcSight, security monitoring, intrusion detection, IDS, IPS, malware analysis, endpoint protection, EDR, XDR, network security, vulnerability management, risk assessment, compliance, NIST, ISO 27001, SOC 2, PCI-DSS, HIPAA, MITRE ATT&CK, cyber threat hunting, digital forensics, DFIR, playbooks, automation, SOAR, Palo Alto, Cisco ASA, Fortinet, firewall management, access control, IAM, identity management, Active Directory, LDAP, cloud security, AWS security, Azure security, GCP security, cloud monitoring, container security, Kubernetes, Docker, DevSecOps, SIEM tuning, log analysis, packet analysis, Wireshark, TCP/IP, DNS, HTTP, SSL/TLS, encryption, data loss prevention, DLP, phishing detection, email security, endpoint hardening, patch management, zero trust, red team, blue team, purple team, security architecture, security engineering, security policy, governance, audit, compliance reporting, SLA management, escalation procedures, team leadership, staff training, mentoring, shift scheduling, KPI tracking, dashboarding, reporting, executive communication, stakeholder management, cross-functional collaboration, project management, change management, agile, ITIL, service management, business continuity, disaster recovery, BCP, DRP, cyber resilience, cyber hygiene, threat modeling, penetration testing, ethical hacking, OSINT, vulnerability scanning, Nessus, Qualys, Rapid7, Tenable, CVE, CVSS, remediation planning, root cause analysis, RCA, security awareness, training programs, phishing simulations, user behavior analytics, UBA, UEBA, insider threat detection, third-party risk, supply chain security, regulatory compliance, audit readiness, security metrics, performance optimization, budget planning, cost control, vendor management, contract negotiation, SLA enforcement, escalation matrix, incident triage, incident escalation, incident containment, incident eradication, post-incident review, lessons learned, continuous improvement, security strategy, roadmap planning, executive reporting, board-level communication, security governance, risk management framework, GRC, business alignment, strategic planning, operational excellence, threat landscape, emerging threats, cyber kill chain, attack vectors, lateral movement, privilege escalation, data exfiltration, ransomware, APTs, nation-state threats, cybercrime, security analytics, machine learning, AI in cybersecurity, behavioral analysis, anomaly detection, log correlation, event normalization, threat feeds, IOC, TTPs, STIX, TAXII, threat sharing, ISACs, security orchestration, playbook development, runbooks, incident workflows, ticketing systems, JIRA, ServiceNow, Remedy, escalation protocols, communication plans, crisis management, tabletop exercises, war games, simulation drills, compliance audits, internal audits, external audits, audit findings, audit remediation, policy enforcement, policy development, documentation, SOPs, runbooks, knowledge base, training materials, onboarding, offboarding, access reviews, privilege reviews, least privilege, role-based access control, RBAC, multi-factor authentication, MFA, single sign-on, SSO, password policies, credential management, secrets management, vaults, HashiCorp Vault, CyberArk, BeyondTrust, PAM, privileged access management, remote access security, VPN, secure tunneling, endpoint isolation, sandboxing, threat emulation, breach detection, kill chain analysis, attack surface reduction, security posture, maturity assessment, gap analysis, benchmarking, metrics, KPIs, dashboards, executive summaries, board reports, strategic initiatives, tactical execution, operational oversight, team development, hiring, performance reviews, succession planning, career development, certifications, CISSP, CISM, CEH, GCIA, GCIH, GNFA, GCFA, OSCP, CCSP, AWS Certified Security, Azure Security Engineer, CompTIA Security+, CompTIA CySA+, CompTIA CASP+, SANS, GIAC, ISC2, ISACA, cybersecurity frameworks, security standards, best practices, industry trends, threat landscape analysis, cyber threat reports, intelligence briefings, situational awareness, real-time monitoring, alert triage, false positive reduction, signal-to-noise ratio, tuning, baselining, escalation paths, incident lifecycle, incident metrics, SOC maturity model, SOC optimization, SOC staffing

#LI-Onsite

#LI-MZ1
group id: 10430981
job ad image
Find Zachary Piper Solutions, LLC on Social Media
Network Employers
user avatar
About Us
Zachary Piper Solutions is a National Security focused technology services and consulting firm with a top-secret facility clearance. We support mission-critical initiatives on behalf of the Intelligence Community, Department of Defense, Department of Homeland Security, Department of Justice, Department of State, and a variety of Civilian Agencies. ZPS is dedicated to help protect government networks against cyber threats and to maximize the wide-spectrum of intelligence and security-related technologies. Our dedicated support and proven experience drive results in support of our client’s mission objectives.
job ad2 image

Zachary Piper Solutions, LLC Jobs


Clearance Level
Secret