Security Operations Center Job Description Templates
Security Operations Center Job Description Templates
1
Hiring and Retaining Top Cybersecurity Talent, (ISC)2 , Oct 17, 2018
2 | Introduction
Job Description Template
Required Qualifications
• 10+ years of IT and relevant security experience
• Bachelor’s in Computer Science, Information Security, Business,
Management, Information Technology, or related field
• Experience interpreting and applying industry frameworks
• Demonstrated experience working with organization management and
ability to interact at executive and board level
• Knowledge of legal and regulatory requirements relating to information
security and privacy
Preferred Qualifications
• Master’s in Computer Science, Information Security, Business, or related
field preferred
• Certifications including but not limited to: CISSP – Certified Information
Systems Security Professional, CISM – Certified Information Security Manager
Responsibilities
• Establish and maintain the information security vision and programming
to include policy creation, training, risk assessment, and security incident
response to ensure information assets and technologies are
adequately protected
• Analyze and architect complex solutions to information technology
cybersecurity threats that relate to confidentiality, integrity, and availability of
data and systems
• Provide regular updates to the executive management team on status of
company's risk posture and security program
• Organize and lead the security incident response capability, preemptively
engaging with and training stakeholders throughout the organization
• Manage and oversee our business continuity and disaster recovery efforts to
ensure the organization is prepared for high-risk business disruptions
• Manage and oversee internal and external IT compliance related audit efforts
• Keep abreast of latest security and privacy legislation, regulations,
adversaries, alerts, and vulnerabilities
• Develop and manage budget for security related capital and operational
expenses, training, and staff needs
Skills
• High level of personal integrity, and the ability to professionally handle
confidential matters and demonstrate the appropriate level of judgment and
maturity in risk decision making
• Demonstrated ability to identify and advocate for investments to achieve the
security strategy and provide ROI analyses to recommended new spend,
as appropriate
• Ability to quickly assess complex situations and take appropriate action, such
as during security incidents
• Excellent written and verbal communication skills; interpersonal and
collaborative skills; and the ability to communicate security and risk-related
concepts to technical and nontechnical audiences
• Ability to lead and motivate cross-functional, interdisciplinary teams to
achieve tactical and strategic goals
• Demonstrable evidence of change management skills
• Project management skills; financial/budget management, scheduling, and
resource management
Salary Suggestions
Average: $175,000
Ranges: $112,000–$238,000
*Salary figures based on data from averages found via PayScale and Glassdoor
• Describe the most profound executive decision you have ever made in a
related role?
Required Qualifications
• 5+ years of IT and relevant security experience
• 3+ years of experience leading or serving as a senior member of a security
operations team
• Bachelor’s in Computer Science, Information Security, Business,
Management, Information Technology, or related field
• Knowledge of current and emerging technologies and tactics used within a
SOC and how they can be applied to improve efficiency and effectiveness
• Understanding of the information security industry and the current
threat landscape
Preferred Qualifications
• Certifications including but not limited to: CISSP – Certified Information
Systems Security Professional, GIAC – Global Information Assurance
Certification, GSEC – Global Security Essentials Certification, ISACA – IT
Audit, Security, Governance and Risk Certifications
• Prior experience working as a SOC Manager a plus
6 | SOC Manager
Job Description Template
Responsibilities
• Work with the rest of the security operations team to support analysts with
performance feedback, training, and career direction
• Assist with screening and hiring security analysts
• Manage and coordinate incident response and forensic processes
• Monitor and enforce guidelines for best practices in security and compliance
• Support routine regulatory and compliance audit initiatives
• Orchestrate daily compliance requirements and tasks as required
Skills
• Strong leadership skills and the ability to guide others during incident and
crisis management
• Able to tune correlation rules and outcomes via security information and
event management (SIEM) and security orchestration, automation, and
response (SOAR) platforms
• Familiarity with Linux and Windows capabilities and with network and host-
based forensic processes
• Familiarity of the investigation of malware and host compromise incidents
• Understanding of intrusion detection systems, web application firewalls, and
IP reputation systems
• Technical understanding of current cybersecurity threats and trends
• Able to multitask, prioritize, and resolve multiple inquiries at once
• Excellent communication (oral and written), interpersonal, organizational, and
presentation skills
SOC Manager | 7
Job Description Template
Salary Suggestions
Average: $160,000
Ranges: $140,000–$180,000
*Salary figures based on data from averages found via PayScale and Glassdoor
• Can you share a method you have used to ensure that security programs
comply with all policies and requirements?
8 | SOC Manager
Job Description Template
Security Engineer
for [Company Name]
Other used titles include: Cybersecurity Engineer,
Security Engineer, SIEM Engineer, Security Device
Engineer, Technology Engineer
Required Qualifications
• 5+ years of relevant security experience
• Bachelor’s in Computer Science, Information Security, Business,
Management, Information Technology, or related field
• Previous security experience with a variety of security technologies
Preferred Qualifications
• Certifications including but not limited to: CISSP – Certified Information
Systems Security Professional, CISM – Certified Information Security
Manager, ISSAP – Information Systems Security Architecture Professional,
CEH – Certified Ethical Hacker, AWS Certified Solution Architect
Security Engineer | 9
Job Description Template
Responsibilities
• Identify and document information security risks and propose
mitigating controls
• Investigate and respond to security incidents
• Monitor networks and systems for potential threats
• Research, design, and develop new information security controls
• Actively research, evaluate, and drive next generation security technologies
and solutions to solve the organizations needs
• Manage solution development and deployment that adhere to best practices
Skills
• Previously assessed, developed and implemented, operationalized, and
documented comprehensive security technologies and processes
• Hands-on experience with multiple security technologies such as antivirus
software, intrusion detection, firewalls, and content filtering
• Prior experience with secure software development, data protection,
cryptography, key management, identity and access management (IAM),
network security (VPNs) within SaaS, IaaS, PaaS, and other
cloud environments
• Solid understanding of a range of compliance, regulatory, and legal
requirements and relevant principles, best practices, and standards
across multiple industries (e.g., PCI, SOX, GLBA, CSA, PCI, NIST, ISO, IEEE,
FedRAMP, HIPAA, and TCG)
10 | Security Engineer
Job Description Template
Salary Suggestions
Average: $119,000
Ranges: $89,000–$154,000
*Salary figures based on data from averages found via PayScale and Glassdoor
• What type of tests do you use to detect security faults in a network and why?
• Tell me about a time when your ability to analyze needs and product
requirements helped you make an informed decision to benefit your
company’s security.
Security Engineer | 11
Job Description Template
Incident Responder
for [Company Name]
Other used titles include: Incident Handler, Malware
Analyst, Forensics Examiner, Threat Intel Analyst
Required Qualifications
• 2+ years of relevant security experience
• Bachelor’s in Computer Science, Information Security, Business,
Management, Information Technology, or related field
• Hands-on experience in the detection, response, mitigation, and/or reporting
of cyberthreats affecting networks, computer intrusion detection, analysis,
and incident response
Preferred Qualifications
• Certifications including but not limited to: CCE – Certified Computer
Examiner, CEH – Certified Ethical Hacker, GCFE – GIAC Certified Forensic
Examiner, GCFA – GIAC Certified Forensic Analyst
• Experience working with cloud technologies (AWS, Azure, SaaS, etc.)
12 | Incident Responder
Job Description Template
Responsibilities
• Detect and respond to malicious behavior on cloud systems, SaaS,
workstations, servers, and networks
• Optimizes threat detection products for data loss prevention (DLP), security
information and event management (SIEM), advanced email protection,
endpoint detection and response (EDR), antivirus, cloud security
products, intrusion detection systems, and other industry standard
security technologies
• Review and respond to escalated security events
• Proactively hunting threats within our environment
• Write detection signatures, tune systems / tools, develop automation scripts
and correlation rules
• Maintain knowledge of adversary tactics, techniques, and procedures (TTP)
• Conduct forensic analysis on systems and engage third-party resources
as required
• Provide timely and relevant updates to appropriate stakeholders and
decision makers
Skills
• Experience in forensics, malware analysis, threat intelligence
• Ability to understand, modify and create threat detection rules within a SIEM
• Knowledge and experience with the Windows and Linux operating systems
• Experience using Python, Perl, PowerShell, or an equivalent language
• Experience with network forensics and associated toolsets and
analysis techniques
• Experience with host-based detection and prevention suites (Microsoft SCEP,
Carbon Black Response, OSSEC, etc.)
• Ability to reverse engineer malware is a plus
• Understanding of log collection and aggregation techniques, Elasticsearch,
Logstash, Kibana (ELK), syslog-NG, Windows Event Forwarding (WEF), etc.
• Ability to correlate data from multiple data sources to create a more accurate
picture of cyberthreats and vulnerabilities
Incident Responder | 13
Job Description Template
Salary Suggestions
Average: $112,500
Ranges: $100,000–$125,000
*Salary figures based on data from averages found via PayScale and Glassdoor
• Describe the most difficult incident that you’ve ever had to respond to and
what you learned from it?
• If you had the chance to build your own Computer Security Incident
Response Team (CSIRT) how would you start and what would you need?
• Can you describe a time when you leveraged pen tests to stop a threat?
14 | Incident Responder
Job Description Template
Security Analyst
for [Company Name]
Other used titles include: SOC Analyst
*This job description is designed for entry-level or Tier I analysts
Required Qualifications
• 1-3+ years of relevant security experience
• Bachelor’s in Computer Science, Information Security, Business,
Management, Information Technology, or related field
• Practical experience with deployment and/or operation of commonly used
information security solutions
Preferred Qualifications
• Certifications including but not limited to: CISSP – Certified Information
Systems Security Professional, GCFE – GIAC Certified Forensic Examiner,
GCIH – GIAC Certified Incident Handler
Security Analyst | 15
Job Description Template
Responsibilities
• Manage and support the log collection, security scanning, intrusion
detection, content filtering, and other security-related systems
• Review and triage information security alerts, provide analysis, determine
and track remediation, and escalate as appropriate
• Provide support for the log management and security information and event
management (SIEM) solutions
• Ensure authorized access by investigating improper access, revoking access,
reporting violations, and monitoring information requests
• Provide installation, maintenance, upgrades, and troubleshooting of security
applications and appliances across all functional departments
• May perform other duties as assigned including work in other areas to
cover absences or relief to equalize peak work periods or otherwise
balance the workload
Skills
• Strong knowledge of current security threats, techniques, and landscape,
and a dedicated and self-driven desire to research and learn more about the
information security landscape
• Review and triage experience with endpoint detection and response tools
• Experience and knowledge related to the configuration and maintenance of
security monitoring and reporting platforms
16 | Security Analyst
Job Description Template
Salary Suggestions
Average: $68,000
Ranges: $46,000–$97,000
*Salary figures based on data from averages found via PayScale and Glassdoor
• Can you define what data leakage is and what factors can cause
data leakage?
• What have you done to expand or improve your knowledge of the information
security industry in the last year?
Security Analyst | 17
Job Description Template
Next Steps
These templates are a starting point to help you create effective job listings
for your security team. Use them as a guide and modify them to fit the needs
and requirements of your own security team and organization.
18 | Next Steps
Job Description Template
About LogRhythm
LogRhythm empowers more than 4,000 Built by security professionals for security
customers across the globe to measurably professionals, LogRhythm enables security
mature their security operations program. professionals at leading organizations like
LogRhythm's award-winning NextGen SIEM Cargill, NASA, and XcelEnergy to promote
Platform delivers comprehensive security visibility for their cybersecurity program and
analytics; user and entity behavior analytics reduce risk to their organization each and every
(UEBA); network detection and response (NDR); day. LogRhythm is the only provider to earn the
and security orchestration, automation, and Gartner Peer Insights’ Customer Choice for SIEM
response (SOAR) within a single, integrated designation three years in a row. To learn more,
platform for rapid detection, response, and please visit logrhythm.com.
neutralization of threats.
About LogRhythm | 19
1.866.384.0713 // [email protected] // 4780 Pearl East Circle, Boulder CO, 80301