Hampton North ยท 1 day ago
Information Security Operations Manager
Hampton North is seeking an engineer-minded Security Operations Manager to lead a small team and modernize their security operations program. The role involves leading daily security operations, building automation to reduce repetitive tasks, and improving the security tooling stack while mentoring analysts and collaborating with various teams.
Staffing & Recruiting
Responsibilities
Lead day to day security operations with a strong technical focus. Write SPL and KQL searches, refine detections, hunt through logs, investigate alerts, and remove manual work wherever possible
Build automation that reduces repetitive analyst tasks. Improve alert quality, lower false positives, and create repeatable playbooks that actually work
Own incident response execution across a global footprint. Partner with infrastructure, cloud engineering, compliance, legal, and leadership to keep events contained and communication clean
Modernize and improve the security tooling stack across Splunk, Sentinel, Varonis, ServiceNow, JIRA, and related platforms. Identify gaps, tune configurations, integrate intelligence, and push for better signal to noise
Track and present operational metrics such as MTTD and MTTR. Use data to justify changes and guide continuous improvement
Build stronger operational procedures and controls with an engineering first mindset. Move the program closer to a modern, automated, repeatable workflow
Mentor a team of two analysts. Set technical direction, review their work, and help them level up as builders instead of button pushers
Collaborate across security, technology, privacy, compliance, and executive groups to support a broader enterprise risk function
Qualification
Required
8 plus years in security or IT operations with at least 6 years focused on incident response
2 plus years leading people or directing technical work in a SOC, IR, or detection function
Strong fluency with SPL and KQL for searches, detections, and investigations
Experience reviewing logs, tuning SIEM content, writing scripts, and creating structured queries with regex
Background with Splunk, Microsoft Sentinel, Varonis DatAdvantage, JIRA, or ServiceNow
Strong foundation in malware analysis, threat detection, and incident response across hybrid environments
Understanding of AI security use cases and associated risks
Ability to communicate clearly with both technical teams and business leadership
Bachelor's degree in Computer Science, Information Systems, or similar
Preferred
CISSP, CISM, OSCP, CRISC, or SANS certifications are a plus
Benefits
15% bonus