What are the responsibilities and job description for the Cyber Security Manager position at SoTalent?
Job Title: Cybersecurity Operations Manager
Location: Frisco, TX
Type: Full Time
Our client is looking for a Cybersecurity Operations Manager to lead day‑to‑day security operations, strengthen incident response capabilities, and guide a high‑performing team of security analysts. This role blends people leadership, incident command, and hands‑on technical oversight across endpoint, email, and log‑based detections.
What You’ll Do
Lead Incident Response
- Oversee the full incident response lifecycle—detection, containment, eradication, recovery, and remediation
- Conduct deep‑dive investigations, root‑cause analysis, and post‑incident reviews
- Communicate clearly with technical and business stakeholders during incidents
Manage SOC Operations
- Direct daily SOC activities: alert triage, monitoring, escalation, and response
- Define operational standards, escalation playbooks, and response expectations
- Identify gaps in detection coverage and strengthen monitoring strategies
Develop & Lead the Team
- Mentor and manage security analysts; set goals and support career growth
- Build a high‑performing, collaborative incident response culture
Own Key Security Technologies
- Oversee endpoint and email security tools
- Utilize SIEM and logging platforms; optimize pipelines using modern logging solutions
- Monitor emerging threats and recommend improvements to leadership
Strengthen Security Governance
- Develop and enforce security policies, best practices, and operational standards
- Align with frameworks like NIST, ISO, and CIS
- Support hybrid and cloud‑native security environments
Who We’re Looking For
- Bachelor’s degree in Computer Science, Cybersecurity, or related field (or equivalent experience)
- 5 years in cybersecurity operations, SOC, or incident response roles
- 2 years leading or mentoring security analysts
- Strong hands‑on experience with endpoint detection platforms (required)
- Experience with SIEM, centralized logging, and modern security tooling
- Understanding of attacker TTPs and the MITRE ATT&CK framework
- Proven ability to lead complex incidents from start to finish
- Strong communication, leadership, and problem‑solving skills
- Experience with cloud, hybrid environments, and regulatory frameworks
- Certifications such as CISSP, OSCP, GCIH, GCED, CEH, GIAC, or product‑specific certifications (preferred)
Compensation & Benefits
- Competitive salary based on experience
- Annual performance‑based bonus eligibility
- Medical, Dental, and Vision insurance
- Disability coverage
- Paid Time Off (vacation, sick time, parental leave)
- 401(k) with company match
- Tuition reimbursement
- Mileage reimbursement