
- Professional
- Bureau à Austin
Solis Security is a Managed Security Services Provider (MSSP) delivering security monitoring, incident response, and risk advisory services trusted for over 20 years by customers in 90+ countries. Our U.S. Security Operations Center (SOC) is a critical hub in our follow-the-sun model, protecting clients across industries with world-class detection and response.
Key Responsibilities
Leadership and Staff Management
· Supervise U.S. SOC personnel, ensuring professional development, clear performance expectations, and operational excellence.
· Promote a culture of accountability, continuous learning, and customer-first thinking across all SOC functions.
· Lead efforts to attract, retain, and grow SOC talent, fostering a high-performing and collaborative regional team.
· Develop and maintain U.S. SOC staffing and coverage models, ensuring consistency, quality, and responsiveness to customer alerts and incidents.
· Drive effective delivery of all SOC services and continuous improvement of operational procedures, informed by metrics and data-driven insights.
· Oversee escalation and incident management for the region, training leads and analysts to handle high-impact events and executive communications effectively.
· Contribute to the SOC’s tooling and automation roadmap, clarifying requirements, supporting integrations, and collaborating with global engineering counterparts.
· Stay actively involved in analyst training, solution validation, and process optimization to enhance detection and response capabilities.
· Represent the SOC in cross-functional initiatives, customer interactions, and leadership discussions where technical and operational alignment is critical.
Skills, Knowledge & Expertise
Qualifications
Minimum Qualifications
· Experience in Cybersecurity, Information Systems, or a related technical field focused on security operations or incident response.
· 2+ years managing a SOC or multi-team security monitoring environment.
· Strong technical understanding of operating systems, network defense, and incident response.
· Excellent written and verbal communication skills with both technical and executive stakeholders.
· 5+ years of experience as a SOC or incident response analyst.
· MSSP or MDR experience strongly preferred.
· Familiarity with EDR (SentinelOne, CrowdStrike, Microsoft Defender) and SIEM/SOAR tools (Splunk, QRadar, Sumo Logic).
· Understanding of automation, orchestration, and AI/ML in SOC operations.
· Relevant certifications such as CISSP, CISM, GCIH, or equivalent.
· Experience with cloud security monitoring (AWS, Azure, GCP).
Job Benefits
- Medical, Dental and Vision Insurance
- 401(k) Plan with Company Match
- Tuition Assistance Program
- Generous PTO after first 90 days
- Company match to Employee Charitable contributions
- Additional Voluntary benefits
- Plus other Perks to support your well-being
- Including Hybrid Work environment for roles based in Austin, Texas