The Security Operations Manager (SecOps Manager) leads day-to-day security operations for our managed services and security customers supporting customers primarily in the defense industrial base (DIB). The ideal candidate has hands-on experience managing Microsoft 365 E5 security solutions and a deep understanding of the compliance and threat landscape in regulated industries particularly CMMC 2.0.
The SecOps Manager will lead a team of analysts and engineers while also managing external SOC partnerships ensuring operational excellence in threat detection response and vulnerability management. The role directly impacts the resilience of our customers environmentsmost of which require strict compliance and a zero-tolerance approach to risk.
Key Responsibilities
Microsoft 365 & Cloud Security Operations
Specify deploy and manage security baselines and configurations across Microsoft 365 Defender products:
o Defender for Endpoint
o Defender for Office 365
o Defender for Cloud Apps (MCAS)
o Defender for Identity (formerly ATA)
o Microsoft Defender XDR
Make recommendations for the adoption of Microsoft Secure Futures Initiative (SFI) six pillars:
o Identity and access
o Network and perimeter
o Data protection
o Device security
o Infrastructure security
o Threat protection
Monitor and fine-tune data connectors analytics rules hunting queries and playbooks for operations.
Compliance and Regulatory Readiness
Design recommend and enforce security and compliance configurations supporting CMMC 2.0 (Levels 13) NIST 800-171 and DFARS requirements through collaboration with Product Development and Security Program Management groups.
Collaborate with Security Program Management and Product Development to validate technical controls and audit readiness.
Security Incident Response
Own the triage escalation and resolution lifecycle for security incidents.
Develop maintain and execute Incident Response playbooks for phishing endpoint compromise insider threats cloud account takeovers etc.
Lead root cause analysis (RCA) and post-incident reviews (PIR).
3rd-Party SOC and Tooling Oversight Manage relationships and service delivery from external SOC providers and MSSP tools (e.g. MDR log analysis platforms).
Coordinate onboarding/offboarding and integration of new customer tenants with SOC partners.
Vulnerability and Patch Management
Oversee operating system and third-party software patching cycles for customer environments.
Prioritize and manage vulnerability remediation in coordination with infrastructure teams and customer needs.
Leverage Microsoft Defender Vulnerability Management (MDVM) and MDE APIs for continuous hygiene improvement.
Security Engineering & Automation
Lead efforts to automate detection response and reporting workflows using Power Automate Sentinel Logic Apps or custom scripting.
Maintain and document secure configuration baselines for Microsoft 365 services Azure and Windows endpoints.
Threat Intelligence & Detection Engineering
Monitor threat feeds and indicators relevant to the DIB sector.
Collaborate with detection engineers to refine behavioral analytics and eliminate noise in alerts.
Coordinate with internal and external threat intelligence analysts.
Customer Engagement & Reporting
Participate in monthly and quarterly security review meetings with clients (or as necessary to support Security Program Management).
Prepare actionable security reports incident summaries and recommendations.
Provide expert guidance on emerging threats tool capabilities and E5 feature usage.
Qualifications
5 years in a Security Operations Incident Response or Cyber Defense role.
2 years managing security operations in an MSP or MSSP environment.
Hands-on experience with Microsoft 365 E5 security stack and Microsoft Sentinel.
Hands-on experience with ninjaOne
Strong working knowledge of CMMC 2.0 NIST 800-171 and other compliance frameworks.
Familiarity with MITRE ATT&CK Kill Chain models and threat intelligence frameworks.
Strong leadership and vendor management skills.
Preferred
Industry certifications preferred: GIAC GCIH CISSP AZ-500 SC-200 or Microsoft Cybersecurity Architect Expert.
Strong communicator who can translate technical concepts for executive and non-technical audiences.
Operationally minded but capable of big-picture strategy.
Calm under pressure especially during high-stakes incident response scenarios.
Comfortable working across multiple customer tenants in a fast-paced high-trust environment.
Where required by law this posting includes a goodâfaith pay range for candidates who will perform the role in specific jurisdictions. For other locations the actual compensation may differ. Final compensation will be determined based on qualifications experience skills work location internal equity and current market data. This job posting is not a contract or promise of employment or any particular compensation and any employment offer will be set out in a written offer letter.
EOE M/F/D/V
Required Experience:
Manager
NeoSystems offers strategic back office services, hosting, CMMC & security services for government contractors. Find out what we can do for your business!