SOC Manager
TENEX.AI
Location
Kansas City, MO SOC
Employment Type
Full time
Location Type
On-site
Department
Security Operations
About the Company: TENEX.AI is an AI-native, automation-first, built-for-scale Managed Detection and Response (MDR) provider. We are a force multiplier for defenders, helping organizations enhance their cybersecurity posture through advanced threat detection, rapid response, and continuous protection. Our team is composed of industry experts with deep experience in cybersecurity, automation, and AI-driven solutions. We’re a fast growing startup backed by industry experts and top tier investor Andreessen Horowitz. As an early employee, you’ll play a meaningful role in defining and building our culture. Get in on the ground floor. We’re a small but well-funded team that just raised a substantial round – joining now comes with limited risk and unlimited upside. We are rapidly growing and seeking top talent to join our mission of revolutionizing the cybersecurity landscape.
The Opportunity: As the Security Operations Manager, you will oversee the daily operations of a Security Operations Center (SOC) for our evening SOC team. This includes leading and mentoring a team of security analysts, developing and implementing security policies and procedures, and ensuring the effective use of security tools and technologies. The SOC Manager is responsible for the detection, analysis, and response to security incidents, as well as proactive threat hunting and vulnerability management.
Culture is one of the most important things at TENEX.AI—check out our culture deck at culture.tenex.ai to experience how we champion it, valuing the unmatched collaboration and community of in-person work while offering flexibility for the best of the best.
The ideal candidate will be able to work onsite for the evening SOC support our Overland Park, KS (Kansas City Metro Area) location.
Responsibilities
Lead, mentor, and manage a team of SOC analysts, fostering a culture of continuous learning and improvement.
Contribute to active cases and other Security Operations Center requirements as directed by the Director of Security.
Develop, implement, and maintain SOC processes, procedures, and runbooks to ensure efficient and effective security operations.
Oversee the 24/7 monitoring, detection, and analysis of security events and incidents.
Manage and prioritize security incidents, ensuring timely and effective response, containment, and recovery.
Conduct regular threat intelligence analysis to identify emerging threats and vulnerabilities.
Implement and optimize security tools and technologies, including SIEM, EDR, IDS/IPS, and vulnerability scanners.
Develop and deliver regular reports on SOC performance, incident trends, and security posture.
Collaborate with other IT teams to ensure the integration of security into all aspects of the organization's infrastructure.
Stay up-to-date with the latest security trends, technologies, and best practices.
Manage and participate in on-call rotations as needed.
Qualifications
Bachelor's degree in Computer Science, Information Security, or a related field
5+ years of experience in information security, with at least 2 years in a leadership/mentorship or management role within a SOC.
Strong understanding of security principles, technologies, and best practices.
Experience with security frameworks (e.g., NIST, ISO 27001).
Proficiency with SIEM platforms (e.g., Splunk, QRadar, Sentinel) and other security tools.
Experience in incident response, threat hunting, and vulnerability management.
Excellent leadership, communication, and interpersonal skills.
Relevant security certifications (e.g., CISSP, CISM, GCIH, GCIA) are highly desirable.
Experience with security orchestration, automation, and response (SOAR) platforms.
Exposure to cloud security platforms (e.g., AWS, Azure, Google Cloud) and the associated risks.
Practical experience working with Google SecOps tools and Chronicle for centralized threat intelligence and event correlation a plus.
Hands-on experience with the Microsoft security platform (Sentinel, Defender) is a plus.
Why Join Us?
Opportunity to work with cutting-edge AI-driven cybersecurity technologies and Google SecOps solutions.
Collaborate with a talented and innovative team focused on continuously improving security operations.
Competitive salary and benefits package.
A culture of growth and development, with opportunities to expand your knowledge in AI, cybersecurity, and emerging technologies.
If you're passionate about combining cybersecurity expertise with artificial intelligence and have experience with Google SecOps and Chronicle, we encourage you to apply!