Posted today
Unspecified
Mid Level Career (5+ yrs experience)
$180,000 - $200,000
IT - Data Science
Washing, DC (On-Site/Office)
Security Operations Center (SOC) Manager
Location: Washington, D.C. (5x Onsite)
Company: Big Impact Tech (BIT)
Clearance Required: Active Secret
Employment Type: Full-Time
Position Overview
The SOC Manager will lead BIT’s Security Operations Center functions and serve as the key
point of coordination between day-to-day security monitoring and the broader organizational
cybersecurity strategy. This role oversees SOC analysts and contractors, manages incident
response activities, strengthens security processes, and ensures continuous protection of BIT and
federal customer environments.
This is a high-visibility leadership role requiring strong communication, operational maturity,
and technical expertise in modern SOC environments.
Key Responsibilities
Leadership & Team Management
• Lead, coach, and mentor SOC analysts (Tier 1–3), contractors, and cyber support staff.
• Build a culture of accountability, collaboration, and continuous improvement.
• Establish and manage SOC performance goals (MTTD, MTTR, alert fidelity, workload
distribution, case quality).
• Conduct recurring training, coaching sessions, and knowledge-sharing activities.
Security Operations Oversight
• Oversee daily SOC operations including monitoring, detection, triage, investigation, and
response.
• Ensure high-quality case management within SIEM/EDR platforms (Elastic, Splunk, MS
Defender, Tenable, Zscaler, Cisco/Fortinet, etc.).
• Review escalations, incident reports, and threat patterns to identify operational and
tooling improvements.
• Coordinate cross-team and cross-agency actions during major incidents.
Policy, Procedures & Continuous Improvement
• Develop and refine SOC policies, SOPs, response playbooks, and escalation workflows.
• Identify operational gaps and lead improvements in detection logic, automation, and
response processes.
• Implement SOC metrics dashboards, reporting cycles, and quality assurance reviews.
Technology & Tooling Management
• Evaluate and optimize SOC tooling (SIEM, IDS/IPS, EDR, case management, scanning
tools, threat intel feeds).
• Ensure platforms are properly tuned, updated, and configured for visibility and rapid
detection.
• Collaborate with engineering teams to onboard logs, expand visibility, and streamline
integrations.
Incident Response & Escalations
• Serve as the senior escalation point for critical incidents across BIT customer
environments.
, • Lead major incident response activities, root cause analysis, and remediation planning.
• Ensure timely, accurate communication to BIT leadership, PMs, and federal stakeholders.
Stakeholder Engagement & Reporting
• Act as the primary SOC liaison to CISO, ISSO teams, program managers, and
government clients.
• Deliver executive-level reporting and briefings on SOC metrics, threat trends, and
program risks.
• Translate technical risks into business-aligned impacts and recommendations.
Compliance & Governance
• Support RMF, STIG, POA&M, ACAS, continuous monitoring, and federal cybersecurity
requirements.
• Ensure SOC processes align with NIST, DHS, DoD, and program-specific standards and
policies.
Required Skills & Qualifications
• 5+ years of cybersecurity experience in SOC, incident response, or threat hunting roles.
• 2+ years leading or managing security teams (federal experience strongly preferred).
• Deep understanding of SIEM, IDS/IPS, EDR, and security monitoring technologies.
• Expertise in core SOC functions: threat detection, log analysis, incident response,
forensics fundamentals, malware behavior.
• Familiarity with federal cyber frameworks (RMF, NIST 800-53, STIGs, ACAS, CDM,
etc.).
• Strong communication skills with experience briefing executives and mentoring junior
analysts.
• Ability to operate effectively in high-tempo, mission-critical environments.
Preferred Qualifications
• Experience supporting SOC operations for federal agencies (e.g., Treasury, DHS,
Commerce, DoI, US Courts).
• Experience with SOC modernization initiatives (SOAR, automation, playbooks, threat
intel integration).
• Industry certifications such as CISSP, CISM, GCIA, GCIH, GCED, or equivalent.
Location: Washington, D.C. (5x Onsite)
Company: Big Impact Tech (BIT)
Clearance Required: Active Secret
Employment Type: Full-Time
Position Overview
The SOC Manager will lead BIT’s Security Operations Center functions and serve as the key
point of coordination between day-to-day security monitoring and the broader organizational
cybersecurity strategy. This role oversees SOC analysts and contractors, manages incident
response activities, strengthens security processes, and ensures continuous protection of BIT and
federal customer environments.
This is a high-visibility leadership role requiring strong communication, operational maturity,
and technical expertise in modern SOC environments.
Key Responsibilities
Leadership & Team Management
• Lead, coach, and mentor SOC analysts (Tier 1–3), contractors, and cyber support staff.
• Build a culture of accountability, collaboration, and continuous improvement.
• Establish and manage SOC performance goals (MTTD, MTTR, alert fidelity, workload
distribution, case quality).
• Conduct recurring training, coaching sessions, and knowledge-sharing activities.
Security Operations Oversight
• Oversee daily SOC operations including monitoring, detection, triage, investigation, and
response.
• Ensure high-quality case management within SIEM/EDR platforms (Elastic, Splunk, MS
Defender, Tenable, Zscaler, Cisco/Fortinet, etc.).
• Review escalations, incident reports, and threat patterns to identify operational and
tooling improvements.
• Coordinate cross-team and cross-agency actions during major incidents.
Policy, Procedures & Continuous Improvement
• Develop and refine SOC policies, SOPs, response playbooks, and escalation workflows.
• Identify operational gaps and lead improvements in detection logic, automation, and
response processes.
• Implement SOC metrics dashboards, reporting cycles, and quality assurance reviews.
Technology & Tooling Management
• Evaluate and optimize SOC tooling (SIEM, IDS/IPS, EDR, case management, scanning
tools, threat intel feeds).
• Ensure platforms are properly tuned, updated, and configured for visibility and rapid
detection.
• Collaborate with engineering teams to onboard logs, expand visibility, and streamline
integrations.
Incident Response & Escalations
• Serve as the senior escalation point for critical incidents across BIT customer
environments.
, • Lead major incident response activities, root cause analysis, and remediation planning.
• Ensure timely, accurate communication to BIT leadership, PMs, and federal stakeholders.
Stakeholder Engagement & Reporting
• Act as the primary SOC liaison to CISO, ISSO teams, program managers, and
government clients.
• Deliver executive-level reporting and briefings on SOC metrics, threat trends, and
program risks.
• Translate technical risks into business-aligned impacts and recommendations.
Compliance & Governance
• Support RMF, STIG, POA&M, ACAS, continuous monitoring, and federal cybersecurity
requirements.
• Ensure SOC processes align with NIST, DHS, DoD, and program-specific standards and
policies.
Required Skills & Qualifications
• 5+ years of cybersecurity experience in SOC, incident response, or threat hunting roles.
• 2+ years leading or managing security teams (federal experience strongly preferred).
• Deep understanding of SIEM, IDS/IPS, EDR, and security monitoring technologies.
• Expertise in core SOC functions: threat detection, log analysis, incident response,
forensics fundamentals, malware behavior.
• Familiarity with federal cyber frameworks (RMF, NIST 800-53, STIGs, ACAS, CDM,
etc.).
• Strong communication skills with experience briefing executives and mentoring junior
analysts.
• Ability to operate effectively in high-tempo, mission-critical environments.
Preferred Qualifications
• Experience supporting SOC operations for federal agencies (e.g., Treasury, DHS,
Commerce, DoI, US Courts).
• Experience with SOC modernization initiatives (SOAR, automation, playbooks, threat
intel integration).
• Industry certifications such as CISSP, CISM, GCIA, GCIH, GCED, or equivalent.
group id: 91164055