Назад
Company hidden
6 часов назад

Manager, SOC (AI)

Формат работы
hybrid
Тип работы
fulltime
Грейд
lead
Английский
b2
Страна
US
Релокация
US
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Manager, SOC (AI): Designing and operating an internal SOC with an accent on hands-on detection engineering, SOAR playbook development, and AI-native security workflows. Focus on building detection coverage from scratch, automating response playbooks, and operationalizing agentic AI capabilities within a greenfield environment.

Location: Must be based in or willing to relocate to Austin, TX (Hybrid)

Company

hirify.global is a cloud-native security platform provider dedicated to Zero Trust and data protection, serving global businesses and governments for over 20 years.

What you will do

  • Build and mature the internal SOC, including processes, tooling, and analyst workflows.
  • Personally author detection rules at the field-logic level and maintain a library mapped to MITRE ATT&CK.
  • Develop and own SOAR playbooks and automation workflows hands-on.
  • Operate and extend the agentic AI SOC platform by configuring use cases and response logic.
  • Lead incident response processes, including containment, investigation, and post-incident reviews.
  • Hire, mentor, and develop a small, growing team of SOC analysts.

Requirements

  • 5+ years in security operations, with 3+ years in a SOC leadership or senior engineering role.
  • Proven, personal detection authorship at field-logic level in a SIEM (e.g., Splunk, Sentinel, Elastic).
  • Hands-on SOAR build experience (e.g., Splunk SOAR, XSOAR, Swimlane).
  • Demonstrated ability to build SOC processes and playbooks in greenfield environments.
  • Working knowledge of cloud security (AWS, Azure, or GCP).
  • Must have the right to work in the United States.

Nice to have

  • Experience with AI-native or agentic SOC platforms.
  • Hands-on incident response experience in cloud-native environments.
  • Background in MSSP or MDR environments.
  • Relevant certifications such as CISSP, GCIA, GCIH, or CySA+.

Culture & Benefits

  • Opportunity to work with cutting-edge agentic AI security technologies.
  • Collaborative environment focused on building and technical innovation.
  • Commitment to diversity, inclusion, and equal employment opportunity.
  • Support for professional growth and team development.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →