This job is closed

We regret to inform you that the job you were interested in has been closed. Although this specific position is no longer available, we encourage you to continue exploring other opportunities on our job board.

Mindpoint Group - Arlington, VA

posted about 2 months ago

Full-time - Mid Level
Hybrid - Arlington, VA
Professional, Scientific, and Technical Services

About the position

The SOC Team Lead at MindPoint Group plays a critical role in the Security Operations Center (SOC), overseeing incident response and guiding analysts through complex cyber threats. This position involves optimizing security operations, mentoring team members, and ensuring effective incident management while maintaining high performance standards. The role requires a deep understanding of cybersecurity operations and the ability to lead and communicate effectively with both internal teams and federal leadership.

Responsibilities

  • Optimize security operations within the SOC to meet key performance indicators.
  • Take ownership of the SOC SOP and playbook life cycle, creating and updating documentation for monitoring and incident response.
  • Review and provide recommendations on department security policies, including the Incident Response Plan (IRP).
  • Mentor shift leads and analysts on detection analysis and incident response techniques.
  • Lead the department's incident response during security incidents.
  • Conduct briefings related to SOC status to Federal and MPG Leadership.
  • Track performance and recommend improvements on SOC metrics.
  • Oversee the SOC's 24x7x365 operations, including shift schedules and minimum manning requirements.

Requirements

  • 5 years of documented experience and/or education in IT or Cybersecurity.
  • Applicable DOD 8570 Certification.
  • Experience with SIEM tools, preferably Splunk.
  • Experience with EDR tools, preferably CrowdStrike.
  • Thorough understanding of cybersecurity operations workflows.
  • Excellent technical, analytical, and organizational skills.
  • Experience securing various environments, including cloud environments.
  • Experience working with and across multiple teams.
  • Understanding of MITRE ATT&CK and D3FEND frameworks.
  • Knowledge of advanced attacker tools, techniques, and procedures (TTP).
  • Familiarity with current malware campaigns TTPs.
  • Knowledge of enterprise architecture, including zero trust principles.
  • Knowledge of Windows and Unix file systems.
  • Understanding common phishing techniques and investigation methods.
  • Proficiency in technical writing.
  • Experience in customer service or client-facing roles.
  • Experience presenting and speaking to leadership.
  • Ability to mentor SOC Analysts of varied backgrounds and experience levels.

Nice-to-haves

  • Additional relevant certifications such as those from GIAC or CompTIA.
  • Experience with malware analysis.
  • Knowledge of offensive security tools and techniques.
  • Experience with digital forensics tools and case procedures.
  • Experience with cyber threat intelligence gathering and analysis.
  • Experience with cyber threat hunting.

Benefits

  • Health/Dental/Vision insurance
  • 401(k) matching
  • Flexible Time Off
  • Short-term/Long-term Disability/Life Insurance
  • Referral Bonuses
  • Professional development reimbursement
  • Maternity/Paternity leave
  • Mobile phone stipend
  • Pre-tax commuter benefits
  • Mentorship program opportunities
Job Description Matching

Match and compare your resume to any job description

Start Matching
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service