Secure Technology Integration Group
Director of Managed IT and Security Operations
Secure Technology Integration Group, Palo Alto, California, United States, 94306
Job Title: Director of Managed IT and Security Operations
Location: Hybrid (with minimal travel required)
Position Summary:
Our team is at the heart of our mission to deliver exceptional Cybersecurity and technology services. The Director of Managed IT and Security Operations will lead the Security Operations Center (SOC) and Managed IT (MIT) divisions, bringing together deep technical expertise, vendor management skills, and a passion for solving client challenges. This role is about building trust—with clients, teams, and stakeholders—while ensuring our services consistently align with client needs and exceed expectations.
By fostering innovation, promoting best practices, and driving strategic initiatives, the Director will help shape the future of our Managed IT and Security Operations, ensuring they’re not only effective and also making a significant impact on the businesses we support daily.
Key Responsibilities:
Lead and manage the day-to-day operations of the SOC and MIT divisions, ensuring seamless collaboration and alignment. Serve as the ultimate escalation point for high-severity incidents across both Cybersecurity and IT operations, providing advanced technical expertise. Oversee and contribute to optimizing SOC and MIT tools, including SIEM, EDR, vulnerability management, and IT infrastructure systems. Develop and implement strategic initiatives, including new technology integrations (e.g., SOAR for SOC and automation for MIT). Ensure both divisions meet all performance metrics. Regularly collaborate with clients to understand their needs and ensure alignment between service delivery and client expectations. Guide SOC Engineers, Analysts, and MIT personnel in advanced troubleshooting and IT service management. Develop comprehensive playbooks for incident response and proactive IT/Cybersecurity management. Assess gaps in technical capabilities and recommend training, tools, or additional resources for both divisions. Foster a culture of technical excellence, innovation, and knowledge sharing within the SOC and MIT teams. Qualifications:
Bachelor’s or Master’s degree in Cybersecurity, information technology, or a related field, or equivalent experience. 7+ years of experience in SOC operations, IT Service Management, or similar roles, with a strong technical background. In-depth knowledge of SIEM, EDR, network security tools, and IT management platforms (e.g., Datto, ConnectWise), with hands-on experience in key technologies such as CrowdStrike, including its administration and incident response capabilities. Proven track record in handling critical escalations, IT service outages, and high-severity incidents. Relevant certifications such as CISSP, CISM, CRISC, ITIL or equivalent are strongly preferred. Additional technical certifications (e.g., CEH, GIAC, CCSP) and vendor-specific certifications (e.g., AWS Security, Palo Alto) are a plus. Deep understanding of threat intelligence, forensics, vulnerability management, and IT infrastructure management. Strong client-facing skills with the ability to communicate effectively with clients and align service delivery to their needs. Proven leadership and communication skills, with the ability to mentor technical teams and collaborate across business units. The salary range for this position is $125,000 to $150,000, commensurate with experience and qualifications.
#J-18808-Ljbffr
Lead and manage the day-to-day operations of the SOC and MIT divisions, ensuring seamless collaboration and alignment. Serve as the ultimate escalation point for high-severity incidents across both Cybersecurity and IT operations, providing advanced technical expertise. Oversee and contribute to optimizing SOC and MIT tools, including SIEM, EDR, vulnerability management, and IT infrastructure systems. Develop and implement strategic initiatives, including new technology integrations (e.g., SOAR for SOC and automation for MIT). Ensure both divisions meet all performance metrics. Regularly collaborate with clients to understand their needs and ensure alignment between service delivery and client expectations. Guide SOC Engineers, Analysts, and MIT personnel in advanced troubleshooting and IT service management. Develop comprehensive playbooks for incident response and proactive IT/Cybersecurity management. Assess gaps in technical capabilities and recommend training, tools, or additional resources for both divisions. Foster a culture of technical excellence, innovation, and knowledge sharing within the SOC and MIT teams. Qualifications:
Bachelor’s or Master’s degree in Cybersecurity, information technology, or a related field, or equivalent experience. 7+ years of experience in SOC operations, IT Service Management, or similar roles, with a strong technical background. In-depth knowledge of SIEM, EDR, network security tools, and IT management platforms (e.g., Datto, ConnectWise), with hands-on experience in key technologies such as CrowdStrike, including its administration and incident response capabilities. Proven track record in handling critical escalations, IT service outages, and high-severity incidents. Relevant certifications such as CISSP, CISM, CRISC, ITIL or equivalent are strongly preferred. Additional technical certifications (e.g., CEH, GIAC, CCSP) and vendor-specific certifications (e.g., AWS Security, Palo Alto) are a plus. Deep understanding of threat intelligence, forensics, vulnerability management, and IT infrastructure management. Strong client-facing skills with the ability to communicate effectively with clients and align service delivery to their needs. Proven leadership and communication skills, with the ability to mentor technical teams and collaborate across business units. The salary range for this position is $125,000 to $150,000, commensurate with experience and qualifications.
#J-18808-Ljbffr