The Security Operations Center (SOC) Manager plays a critical role in maintaining and advancing the security posture of the University by managing the day-to-day operations of the SOC. Ensure the effective detection and response to cybersecurity threats, providing leadership to a team of skilled security analysts and our Managed Detection and Response (MDR) company, and implementing lessons learned from previous security incidents.
Fully remote work may be considered.
QualificationsRequired Education:
Bachelor's Degree or equivalent in Computer Science, Information Technology, or Cybersecurity
Preferred Education:
Bachelor's Degree in Computer Science or a related field.
Required Experience:
5+ years relevant security operations experience including experience in cybersecurity or equivalent combination of education and experience. Previous working experience with detection engineering and/or as a SOC analyst. Leadership experience working across a diverse team. Building a threat detection program using risk-based analysis as the foundation. Experience in leading the full life cycle of a security incident, detection, and response journey with the ability to see incidents to their conclusion.
Preferred Experience:
7+ years of experience with detection engineering and/or as a SOC analyst. Leadership experience working across a diverse team, including remote workers.
Required Skills, Knowledge and Abilities:
Fundamentals of networking and operating systems. Strong communication skills and the ability to work with a variety of stakeholders. In-depth knowledge of cybersecurity threats and incident response. Ability to work under pressure and prioritize tasks accordingly. Familiarity with many enterprise security and IT products such as firewalls, EDR, NSM, TIP, threat feeds, cloud services, and how they all fit together. Excellent verbal and written communication skills.
Preferred Skills, Knowledge and Abilities:
Strong public speaking skills. Knowledge of Windows, macOS and Linux operating systems and how to investigate suspicious activity. Basic Linux system administration & troubleshooting experience. Proficiency in developing automation scripts to solve problems. Using SIEMs (such as Splunk Enterprise Security) to perform log analysis.
In compliance with NYC's Pay Transparency Act, the annual base salary range for this position is USD $160,000.00 to USD $180,000.00. New York University considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/training, key skills, internal peer equity, as well as, market and organizational considerations when extending an offer. This pay range represents base pay only and excludes any additional items such as incentives, bonuses, clinical compensation, or other items.
NYU aims to be among the greenest urban campuses in the country and carbon neutral by 2040. Learn more at nyu.edu/nyugreen.
EOE/AA/Minorities/Females/Vet/Disabled/Sexual Orientation/Gender Identity