We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Manager-Cyber Security

Georgia Tech
United States, Georgia, Atlanta
Jan 10, 2026
Apply for Job
Job ID
293947
Location
Atlanta, Georgia
Full/Part Time
Full-Time
Regular/Temporary
Regular
Add to Favorite Jobs
Email this Job
About Us

Overview
Georgia Tech prides itself on its technological resources, collaborations, high-quality student body, and its commitment to building an outstanding and diverse community of learning, discovery, and creation. We strongly encourage applicants whose values align with our institutional values, as outlined in our Strategic Plan. These values include academic excellence, diversity of thought and experience, inquiry and innovation, collaboration and community, and ethical behavior and stewardship. Georgia Tech has policies to promote a healthy work-life balance and is aware that attracting faculty may require meeting the needs of two careers.

About Georgia Tech
Georgia Tech is a top-ranked public research university situated in the heart of Atlanta, a diverse and vibrant city with numerous economic and cultural strengths. The Institute serves more than 45,000 students through top-ranked undergraduate, graduate, and executive programs in engineering, computing, science, business, design, and liberal arts. Georgia Tech's faculty attracted more than $1.4 billion in research awards this past year in fields ranging from biomedical technology to artificial intelligence, energy, sustainability, semiconductors, neuroscience, and national security. Georgia Tech ranks among the nation's top 20 universities for research and development spending and No. 1 among institutions without a medical school.

Georgia Tech's Mission and Values
Georgia Tech's mission is to develop leaders who advance technology and improve the human condition. The Institute has nine key values that are foundational to everything we do:
1. Students are our top priority.
2. We strive for excellence.
3. We thrive on diversity.
4. We celebrate collaboration.
5. We champion innovation.
6. We safeguard freedom of inquiry and expression.
7. We nurture the wellbeing of our community.
8. We act ethically.
9. We are responsible stewards.

Over the next decade, Georgia Tech will become an example of inclusive innovation, a leading technological research university of unmatched scale, relentlessly committed to serving the public good; breaking new ground in addressing the biggest local, national, and global challenges and opportunities of our time; making technology broadly accessible; and developing exceptional, principled leaders from all backgrounds ready to produce novel ideas and create solutions with real human impact.

The Office of Information Technology (OIT) provides information technology leadership and support to the Georgia Institute of Technology, working in partnership with academic and business units to meet the unique needs of a leading research university. OIT serves as the primary source of enterprise-wide information technology and telecommunications services in support of students, faculty, staff, and researchers.

Location

Atlanta, GA-- On-site

Department Information

The Security Operations Center (SOC) Manager leads a modern, risk-driven SOC operating under a Federated Attack Surface Management (ASM) and Continuous Exposure Management (CEM) model. This role integrates attack surface visibility, exposure intelligence, detection engineering, and incident response into a unified operation focused on measurable risk reduction rather than alert volume. The SOC Manager translates technical exposure data into actionable business risk, drives cross-functional collaboration, and ensures security operations align with enterprise priorities and threat realities.

Job Summary

The Manager of Cyber Security is responsible for developing and implementing comprehensive cybersecurity strategies to protect the institution's information systems and sensitive data. This role involves leading a team of cybersecurity professionals to monitor, assess, and respond to security threats while ensuring compliance with relevant regulations and best practices. Additionally, the manager collaborates with various departments to promote cybersecurity awareness and establish protocols that safeguard the institution's digital assets.

Responsibilities

Job Duty 1 -
Develop and implement cybersecurity policies and procedures to protect the institution's information systems and data from unauthorized access and breaches.

Job Duty 2 -
Lead a team of cybersecurity professionals in monitoring network activity and identifying potential security threats and vulnerabilities.

Job Duty 3 -
Conduct regular security assessments and audits to evaluate the effectiveness of existing security measures and identify areas for improvement.

Job Duty 4 -
Manage incident response efforts, coordinating investigations of security breaches and implementing remediation plans to mitigate risks.

Job Duty 5 -
Provide cybersecurity training and awareness programs for faculty, staff, and students to promote a culture of security within the institution.

Job Duty 6 -
Stay informed about emerging cybersecurity threats and trends, adjusting strategies and practices to address new risks effectively.

Job Duty 7 -
Work with external partners and regulatory bodies to ensure compliance with relevant laws, regulations, and industry standards in cybersecurity.

Job Duty 8 -
Prepare and present reports on cybersecurity metrics, incidents, and initiatives to senior leadership, demonstrating the effectiveness of the institution's cybersecurity posture.

Job Duty 9 -
Collaborate with Information Technology and academic departments to ensure that all technology initiatives comply with cybersecurity standards and best practices.

Job Duty 10 -
Perform other duties as assigned.

Responsibilities

Key Responsibilities
  • Lead SOC detection, triage, investigation, and incident response using risk-based prioritization
  • Ensure SOC workflows are informed by current attack surface, asset, and exposure intelligence
  • Operationalize ASM and CEM as foundational inputs to security operations
  • Ensure alerts and investigations are mapped to known assets, ownership, and exposure context
  • Partner with ASM, vulnerability management, and engineering teams to drive exposure remediation
  • Operate effectively within a federated security model, establishing SLAs, OLAs, RACI, and risk acceptance processes
  • Collaborate across IT, cloud, network, endpoint, identity, and application teams to reduce systemic risk
  • Provide strategic oversight of detection engineering lifecycle and coverage alignment to threat models
  • Demonstrated experience leading automation-first security operations, leveraging ASM, exposure intelligence, and SOAR to reduce manual effort and improve risk outcomes
  • Strong understanding of automated triage, enrichment, alert suppression, and response orchestration, including human-in-the-loop controls
  • Proven ability to measure and improve automation effectiveness using risk-aligned metrics and continuous improvement practices
  • Define and report risk-aligned SOC metrics and deliver executive-level security narratives
  • Develop SOC talent across incident response, exposure analysis, detection engineering, and automation
Required Qualifications

Educational Requirements
Bachelor's degree in related discipline or equivalent, related experience.

Other Required Qualifications
The job requires one who is task and detail orievented; flexible, and able years perform multiple, various tasks concurrevently. Excellevent communications skills are required as well as the ability years troubleshoot and solve problems that are varied y nature.

Required Experience
5+ years of relevant experience; 3+ years of supervisory knowledge.

Preferred Qualifications

Additional Preferred Qualifications
Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH)

Preferred Educational Qualifications
Master's degree in related discipline or equivalent, related experience.

Preferred Experience
Seven years of related experience

Preferred Qualifications

Preferred Qualifications
  • Experience transforming a traditional SOC into a risk-based or Fusion SOC
  • Background in detection engineering, threat hunting, or security analytics
  • Familiarity with Lean, Six Sigma, ITIL, ITSM, or similar operational frameworks
  • Experience supporting audit, compliance, or regulated environments
  • 7-10+ years in cybersecurity operations, incident response, or detection engineering
  • 3-5+ years leading SOC, IR, or security operations teams in enterprise or federated environments
  • Strong knowledge of ASM, CEM, SIEM, XDR, SOAR, and detection engineering concepts
  • Familiarity with vulnerability management, cloud and SaaS exposure, and identity risk
  • Proven ability to influence without authority and communicate risk effectively to executives
Proposed Salary

$152,167

Knowledge, Skills, & Abilities

SKILLS
Ability to partner with many stakeholders to deliver security risk management services

USG Core Values

The University System of Georgia is comprised of our 26 institutions of higher education and learning as well as the System Office. Our USG Statement of Core Values are Integrity, Excellence, Accountability, and Respect. These values serve as the foundation for all that we do as an organization, and each USG community member is responsible for demonstrating and upholding these standards. More details on the USG Statement of Core Values and Code of Conduct are available in USG Board Policy 8.2.18.1.2 and can be found on-line at https://www.usg.edu/policymanual/section8/C224/#p8.2.18_personnel_conduct.

Additionally, USG supports Freedom of Expression as stated in Board Policy 6.5 Freedom of Expression and Academic Freedom found on-line at https://www.usg.edu/policymanual/section6/C2653.

Equal Employment Opportunity

The Georgia Institute of Technology (Georgia Tech) is an Equal Employment Opportunity Employer. The Institute is committed to maintaining a fair and respectful environment for all. To that end, and in accordance with federal and state law, Board of Regents policy, and Institute policy, Georgia Tech provides equal opportunity to all faculty, staff, students, and all other members of the Georgia Tech community, including applicants for admission and/or employment, contractors, volunteers, and participants in institutional programs, activities, or services. Georgia Tech complies with all applicable laws and regulations governing equal opportunity in the workplace and in educational activities.

Equal opportunity and decisions based on merit are fundamental values of the University System of Georgia ("USG") and Georgia Tech. Georgia Tech prohibits discrimination, including discriminatory harassment, on the basis of an individual's race, ethnicity, ancestry, color, religion, sex (including pregnancy), national origin, age, disability, genetics, or veteran status in its programs, activities, employment, and admissions. Further, Georgia Tech prohibits citizenship status, immigration status, and national origin discrimination in hiring, firing, and recruitment, except where such restrictions are required in order to comply with law, regulation, executive order, or Attorney General directive, or where they are required by Federal, State, or local government contract.

Other Information

This is not a supervisory position.
This position does not have any financial responsibilities.
This position will not be required to drive.
This role is not considered a position of trust.
This position does not require a purchasing card (P-Card).
This position will not travel
This position does not require security clearance.

Background Check

Successful candidate must be able to pass a background check. Please visit http://policylibrary.gatech.edu/employment/pre-employment-screening

Applied = 0

(web-df9ddb7dc-zsbmm)