HimalayasHimalayas logo
DispelDI

Senior Security Operations Engineer

Dispel provides Zero Trust Access solutions for industrial control systems (ICS) and operational technology (OT), specializing in moving target defense to secure critical infrastructure.

Dispel

Employee count: 51-200

Salary: 136k-155k USD

United States only

Stay safe on Himalayas

Never send money to companies. Jobs on Himalayas will never require payment from applicants.

Location: Remote (US-based)

About Dispel:

Dispel is the fastest-growing cybersecurity company recognized in the 2025 Cybersecurity Excellence Awards. We deliver zero trust secure remote access and real-time data streaming for operational technology (OT) and industrial control systems (ICS). Our patented Moving Target Defense technology — referenced in NIST 800-172 — protects critical infrastructure for utilities serving 54 million+ people, manufacturers producing over 50% of US baby formula, and major defense contracts including a $950M IDIQ with the US Air Force.

Why This Role Exists:

Dispel is pursuing FedRAMP High authorization while simultaneously operating a commercial security program. We have a functioning SOC built on Google SecOps (Chronicle) and SentinelOne, but we need a senior IC who can take it from "stood up" to "operationally mature." You'll own the log ingestion pipeline end-to-end and drive material expansion of coverage across federal and commercial environments, including AWS, Azure, and Entra ID.

This person will be the day-to-day technical owner of SOC operations, responsible for closing coverage gaps, building detections, maturing incident response, and providing senior technical direction to the existing SOC analyst. This is a hands-on-keyboard role with leadership expectations — you will not formally manage people, but you will set priorities, review deliverables, and drive execution across the SOC function.

Requirements

Key Responsibilities:

SIEM/SOAR Operations (Google SecOps)

  • Own the log ingestion pipeline end-to-end: identify gaps, build feeds, validate parsing, maintain coverage dashboards
  • Close the federal logging gap and stand up commercial logging across AWS, Azure, Entra ID, and SaaS
  • Activate and configure SecOps SOAR capabilities including Domain-Wide Delegation, marketplace integrations, and bidirectional response actions
  • Build and maintain SOAR playbooks for major incident types such as phishing, malware, account compromise, lateral movement, and cloud-specific threats
  • Develop and maintain operational dashboards for SOC metrics, alert volumes, MTTA/MTTR, and coverage status
  • Manage Google SecOps RBAC

Detection Engineering

  • Build and deploy production detection rules mapped to MITRE ATT&CK within the first year
  • Develop custom parsers for AWS-native security services including GuardDuty, Security Hub, Inspector, WAF, CloudTrail, and VPC Flow Logs
  • Establish a detection lifecycle including proposal, testing, deployment, tuning, and retirement
  • Conduct quarterly detection quality reviews to measure false positive rates, coverage gaps, and rule health
  • Develop alert threshold optimization to reduce noise and analyst fatigue

Endpoint Detection and Response (SentinelOne)

  • Drive SentinelOne deployment across Azure VMs in commercial environments and all federal endpoints
  • Configure and operationalize Cloud Funnel for log export into Google SecOps
  • Build correlation rules between EDR alerts and SIEM detections
  • Manage SentinelOne RBAC groups and policy configuration
  • Coordinate with IT on agent deployment, health monitoring, and version management

Incident Response

  • Serve as senior escalation point for SOC incidents, ensuring investigations are thorough and reports include root cause, remediation actions, credential rotation plans, and follow-up timelines
  • Improve MTTA and MTTR through process optimization, better tooling, and analyst development
  • Lead quarterly tabletop exercises and after-action reviews
  • Maintain and improve incident response runbooks for all major incident categories
  • Integrate incident response workflows with Jira Service Management for tracking and escalation

Vulnerability Management

  • Operationalize monthly scanning cadence across all environments using tools such as Nessus, AWS Inspector, and Azure Defender
  • Define and enforce remediation SLAs by severity: Critical within 72 hours, High within 7 days, Medium within 30 days
  • Build consolidated vulnerability dashboards in Google SecOps
  • Track SLA compliance and report metrics to the CISO
  • Coordinate remediation with engineering and infrastructure teams

MSSP Oversight

  • Serve as primary technical interface with MSSP partner for 24/7 SOC coverage
  • Define and hold the MSSP accountable to SLAs, alert quality, and escalation procedures
  • Review MSSP deliverables such as dashboards, reports, and playbooks for quality and completeness
  • Manage the transition from the previous MSSP and ensure no coverage gaps

SOC Team Technical Leadership

  • Provide day-to-day technical direction to SOC analysts by setting priorities, assigning tasks, and reviewing work products
  • Ensure incident response reports, playbooks, and dashboards meet quality standards before delivery to leadership or external stakeholders
  • Drive OKR execution for SOC-related objectives including logging coverage, detection counts, incident response metrics, and vulnerability SLA compliance
  • Identify skill gaps and development opportunities for junior analysts
  • Establish and enforce SOC processes that are documented, repeatable, and auditable

Required Qualifications:

  • 6+ years of experience in security operations, detection engineering, or SIEM/SOAR engineering
  • Hands-on experience with Google SecOps (Chronicle) or equivalent enterprise SIEM such as Splunk, Sentinel, or QRadar, with Chronicle strongly preferred
  • Production experience with SentinelOne, CrowdStrike, or a comparable EDR platform
  • Deep knowledge of AWS security services including GuardDuty, Security Hub, Inspector, CloudTrail, WAF, and Config
  • Experience building detection rules mapped to the MITRE ATT&CK framework
  • SOAR playbook development and automation experience
  • Demonstrated ability to lead without formal authority by setting direction for peers or junior analysts
  • Strong incident response skills with experience writing complete reports for executive and external audiences
  • Understanding of NIST 800-53 controls, particularly Audit, System Integrity, and Incident Response families
  • Excellent written communication skills

Preferred Qualifications:

  • Experience with Google SecOps (Chronicle), SentinelOne, or similar SIEM/SOAR platforms; certifications are a plus
  • Experience working in a FedRAMP High environment such as AWS GovCloud
  • Azure security experience including Defender for Cloud, Entra ID, Log Analytics, and Event Hubs
  • Experience managing MSSP relationships and enforcing SLAs
  • Background in OT/ICS security monitoring
  • Experience with vulnerability management tools such as Nessus, Inspector, or Defender
  • Previous experience in a startup or high-growth environment building SOC capabilities from early stages

Certifications (Preferred, not required):

  • GCIA, GCIH, GSOM, or other GIAC blue team certifications
  • Google Chronicle or SecOps certifications
  • AWS Security Specialty
  • CISSP or CISM
  • Detection engineering certifications such as SANS SEC555 or SEC511

Benefits

What We Offer:

  • 136K-155K base + equity and performance bonus eligible, depending on experience and location
  • Full medical, vision, and dental insurance
  • Generous PTO
  • Remote-first culture with flexible hours
  • Opportunity to protect critical infrastructure at scale
  • Work with patented, cutting-edge security technology
  • Direct ownership of SOC maturation
  • Collaborative team with military, federal, and private sector expertise

Security Clearance

  • Due to federal customer and FedRAMP requirements, this role requires US Person status (citizen or permanent resident) under ITAR/EAR regulations.
  • Ability to obtain and maintain a security clearance preferred

Dispel is an Equal Opportunity Employer. We do not discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other protected characteristic. We are committed to building a diverse team and encourage applicants from all backgrounds to apply.

About the job

Apply before

Posted on

Job type

Full Time

Experience level

Salary

Salary: 136k-155k USD

Experience

6 years minimum

Location requirements

Hiring timezones

United States +/- 0 hours

About Dispel

Learn more about Dispel and their company culture.

View company profile

At Dispel, we're on a mission to connect people to their industrial control systems, wherever they are in the world. We do this through a product that is fast, easy to implement, and simple to use. We were founded in 2015 with a vision to harness the power of moving target defense in cybersecurity and data privacy. Since then, we've pioneered the first network-level moving target defense SD-WANs and now hold over 42 patents across networking, access control, managed attribution, and zero trust. Our core focus is on providing Zero Trust Access solutions for industrial control systems, serving critical sectors like manufacturing, utilities, and government. We're proud to protect the heart of industry and maximize efficiency for global operations, with our technology safeguarding over $500 billion in manufactured goods annually and supporting utilities for over 54 million people.

Our flagship product, the Dispel Zero Trust Engine (ZTE), simplifies secure remote access, data streaming, micro-segmentation, and ongoing threat detection for industrial control systems and other cyber-physical environments. We understand that in the world of operational technology (OT), every second counts. That's why our platform is designed to get your team on the job in under 30 seconds, a significant improvement over in-house systems that can take many minutes. We believe in building a safer, more resilient world. To that end, we actively collaborate with leading industry bodies like the National Institute of Standards and Technology (NIST), the US Cybersecurity and Infrastructure Security Agency (CISA), and the NATO Industrial Advisory Group (NIAG). By contributing our expertise, we help advance cybersecurity practices globally. We're a team that values diverse backgrounds and innovative thinking, and we offer a nimble startup environment where every member can make a substantial impact on the essential systems that underpin our global economy.

Employee benefits

Learn about the employee benefits and perks provided at Dispel.

View benefits

Stock Option Plan

Company option pool.

Wellness benefits

Wellness benefits for physical fitness.

Life Insurance (Basic, Voluntary & AD&D)

Life Insurance (Basic, Voluntary & AD&D)

Family Leave (Maternity, Paternity)

Equal paternal and maternal parental leave.

View Dispel's employee benefits
Claim this profileDispel logoDI

Dispel

View company profile

Similar remote jobs

Here are other jobs you might want to apply for.

View all remote jobs

6 remote jobs at Dispel

Explore the variety of open remote roles at Dispel, offering flexible work options across multiple disciplines and skill levels.

View all jobs at Dispel

Remote companies like Dispel

Find your next opportunity by exploring profiles of companies that are similar to Dispel. Compare culture, benefits, and job openings on Himalayas.

View all companies

Find your dream job

Sign up now and join over 100,000 remote workers who receive personalized job alerts, curated job matches, and more for free!

Sign up
Himalayas profile for an example user named Frankie Sullivan