What are the responsibilities and job description for the Security Operations Center (SOC) Manager - Active Secret Clearance position at TOMORROW HIRE?
Location: Washington, D.C. (5x Onsite)Clearance Required: Active SecretEmployment Type: Full-Time Salary: $160,000-$200,000Position Overview The SOC Manager will lead our client’s Security Operations Center functions and serve as the key point of coordination between day-to-day security monitoring and the broader organizational cybersecurity strategy. This role oversees SOC analysts and contractors, manages incident response activities, strengthens security processes, and ensures continuous protection of our client and federal customer environments. This is a high-visibility leadership role requiring strong communication, operational maturity, and technical expertise in modern SOC environments. Key Responsibilities Leadership & Team Management Lead, coach, and mentor SOC analysts (Tier 1–3), contractors, and cyber support staff. Build a culture of accountability, collaboration, and continuous improvement. Establish and manage SOC performance goals (MTTD, MTTR, alert fidelity, workload distribution, case quality). Conduct recurring training, coaching sessions, and knowledge-sharing activities. Security Operations Oversight Oversee daily SOC operations including monitoring, detection, triage, investigation, and response. Ensure high-quality case management within SIEM/EDR platforms (Elastic, Splunk, MS Defender, Tenable, Zscaler, Cisco/Fortinet, etc.). Review escalations, incident reports, and threat patterns to identify operational and tooling improvements. Coordinate cross-team and cross-agency actions during major incidents. Policy, Procedures & Continuous Improvement Develop and refine SOC policies, SOPs, response playbooks, and escalation workflows. Identify operational gaps and lead improvements in detection logic, automation, and response processes. Implement SOC metrics dashboards, reporting cycles, and quality assurance reviews. Technology & Tooling Management Evaluate and optimize SOC tooling (SIEM, IDS/IPS, EDR, case management, scanning tools, threat intel feeds). Ensure platforms are properly tuned, updated, and configured for visibility and rapid detection. Collaborate with engineering teams to onboard logs, expand visibility, and streamline integrations. Incident Response & Escalations Serve as the senior escalation point for critical incidents across the customer environments. Lead major incident response activities, root cause analysis, and remediation planning. Ensure timely, accurate communication to the leadership, PMs, and federal stakeholders. Stakeholder Engagement & Reporting Act as the primary SOC liaison to CISO, ISSO teams, program managers, and government clients. Deliver executive-level reporting and briefings on SOC metrics, threat trends, and program risks. Translate technical risks into business-aligned impacts and recommendations. Compliance & Governance Support RMF, STIG, POA&M, ACAS, continuous monitoring, and federal cybersecurity requirements. Ensure SOC processes align with NIST, DHS, DoD, and program-specific standards and policies. RequirementsRequired Skills & Qualifications 5 years of cybersecurity experience in SOC, incident response, or threat hunting roles. 2 years leading or managing security teams (federal experience strongly preferred). Deep understanding of SIEM, IDS/IPS, EDR, and security monitoring technologies. Expertise in core SOC functions: threat detection, log analysis, incident response, forensics fundamentals, malware behavior. Familiarity with federal cyber frameworks (RMF, NIST 800-53, STIGs, ACAS, CDM, etc.). Strong communication skills with experience briefing executives and mentoring junior analysts. Ability to operate effectively in high-tempo, mission-critical environments.Must be able to reliably commute to Washington, D.C. 20032.Must have an active secret cleareancePreferred Qualifications Experience supporting SOC operations for federal agencies (e.g., Treasury, DHS, Commerce, DoI, US Courts). Experience with SOC modernization initiatives (SOAR, automation, playbooks, threat intel integration). Industry certifications such as CISSP, CISM, GCIA, GCIH, GCED, or equivalent. BenefitsBenefitsSalary: $160,000-$200,000Benefits include Health, Vision, and Dental Insurance, and PTO.
Salary : $160,000 - $200,000