user avatar

Security Operations Center (SOC) Manager

ICF

Posted today
Secret
Management (Manager/Director of Staff)
Unspecified
Occasional travel
IT - Security
Seaside, CAMonterey, CA

ICF is seeking an experienced Security Operations Center (SOC) Manager to support a Defense Human Resources Activity (DHRA) cybersecurity program. In this role, you will oversee 24/7 SOC operations, lead a team of analysts performing detection, triage, and escalation, and ensure effective coordination of incident response activities. The SOC Manager develops playbooks, implements monitoring and reporting procedures, and provides regular situational awareness updates to Government stakeholders to strengthen the agency’s cyber defense posture.

This is for a potential future opportunity. This position will be based onsite in Seaside, CA.

What You’ll Do

Manage day-to-day SOC operations, ensuring continuous monitoring of DHRA networks and systems for security events and anomalies.

Lead SOC analysts performing event detection, triage, escalation, and coordination with incident response teams.

Develop, implement, and maintain SOC standard operating procedures (SOPs), playbooks, and escalation protocols.

Ensure timely and accurate analysis of alerts from SIEM, endpoint, and network monitoring tools.

Coordinate with cybersecurity, IT operations, and RMF teams to ensure an integrated defense posture and rapid response to incidents.

Oversee SOC training programs, ensuring analyst proficiency in threat detection, correlation, and response processes.

Conduct root-cause and trend analysis on incidents to identify systemic vulnerabilities and areas for improvement.

Prepare daily, weekly, and monthly operational reports and briefings for Government stakeholders.

Advise leadership on emerging threats, attack trends, and SOC performance metrics.

Drive continuous improvement of monitoring coverage, use cases, and automation within SOC tools and workflows.

Required Qualifications

Bachelor’s degree is required

10 years of experience in cybersecurity operations, analysis, and/or incident response, including at least 3 years in a supervisory or team lead capacity.

Active DOD security clearance.

US Citizenship required by federal contract.

One of the following certifications:

CBROPS

CFR

CySA+

GCFA

GCIA

GICSP

Elastic/Splunk certifications

Desired Qualifications

Master’s degree in cybersecurity, information systems, or a related technical field.

Demonstrated expertise managing SOC or NOC operations in a DoD or Federal environment.

Experience with SIEM, IDS/IPS, endpoint detection, and incident response tools.

Proven ability to coordinate cross-functional teams during incident response and recovery.

Experience managing a 24/7 SOC supporting DoD, IC, or federal missions.

Familiarity with tools such as Splunk, ArcSight, Elastic, Tenable, and SOAR platforms.

Knowledge of MITRE ATT&CK, DoD Cyber Threat Framework, and NIST 800-61 (Computer Security Incident Handling Guide).

Experience implementing SOC metrics, KPIs, and automation strategies.

Strong leadership, communication, and presentation skills, with the ability to brief senior Government officials.
group id: 10106050
N
Name HiddenSenior Talent Acquisition Partner
Find ICF on Social Media
Network Employers
user avatar
About Us
Working at ICF means applying a passion for meaningful work with intellectual rigor to help solve the leading issues of our day. Smart, compassionate, innovative, committed, ICF employees tackle unprecedented challenges to benefit people, businesses, and governments around the globe. We believe in collaboration, mutual respect, open communication, and opportunity for growth. If you’re seeking to make a difference in the world, visit www.icf.com/careers to find your next career. ICF—together for tomorrow.

ICF Jobs


Job Category
IT - Security
Clearance Level
Secret
Employer
ICF