Back to Search Results
Get alerts for jobs like this Get jobs like this tweeted to you
Company: SAIC
Location: REMOTE WORK, TX
Career Level: Mid-Senior Level
Industries: Technology, Software, IT, Electronics

Description

Description

SAIC is a leading provider of innovative cybersecurity solutions, trusted by government and enterprise clients to defend against evolving cyber threats. Our Security Operations Center (SOC) plays a critical role in that mission, providing 24/7 monitoring and rapid incident detection and response.

We are seeking a SOC Supervisor to lead our Tier 1 analyst team and ensure operational excellence in day-to-day security monitoring. This role also includes oversight of initial escalations, EDR and NDR alert triage support, and coordination with senior analysts and other technical teams.

As the SOC Supervisor, you will be responsible for supervising a team of Tier 1 analysts and shift leads who provide first-level response to cybersecurity events across SIEM, EDR, and NDR platforms. You will oversee alert triage, incident escalation, staff scheduling, and operational documentation while driving high-quality service delivery and continuous improvement.

Key Responsibilities:

  • Provide direct supervision, coaching, and support to Tier 1 SOC analysts and shift leads, ensuring 24/7 operational readiness.
  • Oversee triage of SIEM, EDR, and NDR alerts, ensuring proper prioritization, response, and escalation in accordance with defined playbooks.
  • Act as the first line of escalation for complex alerts and incidents from Tier 1 staff.
  • Manage shift coverage, rotations, and scheduling for Tier 1 analysts with input and approval from SOC leadership.
  • Coordinate onboarding and ongoing training to maintain analyst effectiveness and growth.
  • Ensure analysts are following standard operating procedures (SOPs) and incident handling guidelines.
  • Coordinate with Tier 2/3 teams, EDR/NDR engineers, and threat intel teams for escalated event resolution.
  • Recommend enhancements to workflows, detection logic, and incident documentation.
  • Ensure timely and accurate completion of daily SOC shift reports and incident tickets.
  • Maintain SOC documentation, including SOPs, escalation paths, and playbooks.
  • Monitor adherence to SLAs, internal policies, and audit requirements.

Key Skills:

  • Strong understanding of SIEM, EDR, and NDR technologies.
  • Familiarity with common security event types, threats, and incident response best practices.
  • Excellent leadership, communication, and time management skills.
  • Ability to multitask and make decisions in a high-tempo environment.
  • Customer service and relationship management skills at a mid-tier leadership level.
  • Experience with ITSM/ticketing systems and documentation standards.

Qualifications

Required Education:

  • Bachelor's degree in Cybersecurity, Information Technology, or a related field.

Required Experience:

  • Minimum of 4 years of experience in a SOC or security operations environment.
  • At least 1 year in a lead, senior analyst, or supervisory capacity.
  • Certifications: Security+ (required)

Preferred: One or more of the following CySA+, CEH, GSEC, or equivalent.


Target salary range: $80,001 - $120,000. The estimate displayed represents the typical salary range for this position based on experience and other factors.


 Apply on company website