Manager, Cyber Security Operations

NeoSystems Careers

Not Interested
Bookmark
Report This Job

profile Job Location:

Reston, VA - USA

profile Monthly Salary: Not Disclosed
Posted on: Yesterday
Vacancies: 1 Vacancy

Job Summary

The Security Operations Manager (SecOps Manager) leads day-to-day security operations for our managed services and security customers supporting customers primarily in the defense industrial base (DIB). The ideal candidate has hands-on experience managing Microsoft 365 E5 security solutions and a deep understanding of the compliance and threat landscape in regulated industries particularly CMMC 2.0.

The SecOps Manager will lead a team of analysts and engineers while also managing external SOC partnerships ensuring operational excellence in threat detection response and vulnerability management. The role directly impacts the resilience of our customers environmentsmost of which require strict compliance and a zero-tolerance approach to risk.

Key Responsibilities

Microsoft 365 & Cloud Security Operations

Specify deploy and manage security baselines and configurations across Microsoft 365 Defender products:

o Defender for Endpoint

o Defender for Office 365

o Defender for Cloud Apps (MCAS)

o Defender for Identity (formerly ATA)

o Microsoft Defender XDR

Make recommendations for the adoption of Microsoft Secure Futures Initiative (SFI) six pillars:

o Identity and access

o Network and perimeter

o Data protection

o Device security

o Infrastructure security

o Threat protection

Monitor and fine-tune data connectors analytics rules hunting queries and playbooks for operations.

Compliance and Regulatory Readiness

Design recommend and enforce security and compliance configurations supporting CMMC 2.0 (Levels 13) NIST 800-171 and DFARS requirements through collaboration with Product Development and Security Program Management groups.

Collaborate with Security Program Management and Product Development to validate technical controls and audit readiness.

Security Incident Response

Own the triage escalation and resolution lifecycle for security incidents.

Develop maintain and execute Incident Response playbooks for phishing endpoint compromise insider threats cloud account takeovers etc.

Lead root cause analysis (RCA) and post-incident reviews (PIR).

3rd-Party SOC and Tooling Oversight Manage relationships and service delivery from external SOC providers and MSSP tools (e.g. MDR log analysis platforms).

Coordinate onboarding/offboarding and integration of new customer tenants with SOC partners.

Vulnerability and Patch Management

Oversee operating system and third-party software patching cycles for customer environments.

Prioritize and manage vulnerability remediation in coordination with infrastructure teams and customer needs.

Leverage Microsoft Defender Vulnerability Management (MDVM) and MDE APIs for continuous hygiene improvement.

Security Engineering & Automation

Lead efforts to automate detection response and reporting workflows using Power Automate Sentinel Logic Apps or custom scripting.

Maintain and document secure configuration baselines for Microsoft 365 services Azure and Windows endpoints.

Threat Intelligence & Detection Engineering

Monitor threat feeds and indicators relevant to the DIB sector.

Collaborate with detection engineers to refine behavioral analytics and eliminate noise in alerts.

Coordinate with internal and external threat intelligence analysts.

Customer Engagement & Reporting

Participate in monthly and quarterly security review meetings with clients (or as necessary to support Security Program Management).

Prepare actionable security reports incident summaries and recommendations.

Provide expert guidance on emerging threats tool capabilities and E5 feature usage.

Qualifications

5 years in a Security Operations Incident Response or Cyber Defense role.

2 years managing security operations in an MSP or MSSP environment.

Hands-on experience with Microsoft 365 E5 security stack and Microsoft Sentinel.

Hands-on experience with ninjaOne

Strong working knowledge of CMMC 2.0 NIST 800-171 and other compliance frameworks.

Familiarity with MITRE ATT&CK Kill Chain models and threat intelligence frameworks.

Strong leadership and vendor management skills.

Preferred

Industry certifications preferred: GIAC GCIH CISSP AZ-500 SC-200 or Microsoft Cybersecurity Architect Expert.

Strong communicator who can translate technical concepts for executive and non-technical audiences.

Operationally minded but capable of big-picture strategy.

Calm under pressure especially during high-stakes incident response scenarios.

Comfortable working across multiple customer tenants in a fast-paced high-trust environment.

Where required by law this posting includes a goodâfaith pay range for candidates who will perform the role in specific jurisdictions. For other locations the actual compensation may differ. Final compensation will be determined based on qualifications experience skills work location internal equity and current market data. This job posting is not a contract or promise of employment or any particular compensation and any employment offer will be set out in a written offer letter.

EOE M/F/D/V


Required Experience:

Manager

The Security Operations Manager (SecOps Manager) leads day-to-day security operations for our managed services and security customers supporting customers primarily in the defense industrial base (DIB). The ideal candidate has hands-on experience managing Microsoft 365 E5 security solutions and a de...
View more view more

Key Skills

  • Splunk
  • Compliance Management
  • IDS
  • SOC
  • Cybersecurity
  • Identity & Access Management
  • Security
  • Information Security
  • Process Engineering
  • Metadata
  • Encryption
  • Siem

About Company

Company Logo

NeoSystems offers strategic back office services, hosting, CMMC & security services for government contractors. Find out what we can do for your business!

View Profile View Profile