ge and lead the SOAR Team, including Senior SOAR Engineers and SOAR Engineers- 10% of the time. Define and implement KPIs and performance metrics for both clients and SOAR Team members, ensuring alignment with organizational goals- 10% of the time. Enhance the experience of Security Analysts by continuously improving case management, investigations, and escalation processes- 8% of the time. Oversee client escalations, ensuring ticket quality meets organizational standards and that automated SOAR playbooks function effectively- 2% of the time. Ensure escalations meet CyFlare standards, with a focus on maintaining high True Positive (TP) rates, minimizing False Positives (FP), and improving client engagement- 5% of the time. Lead the development of innovative use-case automation to enhance client security and experience. Collaborate with the SOAR Support team to troubleshoot integration and connector issues- 5% of the time. Regularly communicate with internal and external stakeholders to provide updates on SOAR developments and initiatives- 10% of the time. Drive continuous improvement in incident response and management processes- 10% of the time. Stay updated on emerging threats, vulnerabilities, and security trends to inform SOAR strategies- 10% of the time. Develop and implement exclusions, queries, and playbook enhancements to optimize client environments and experience- 10% of the time. Manage and prioritize tasks and projects assigned by leadership, aligning them with team strengths and goals- 10% of the time. Support the training and onboarding of new SOC members, ensuring they are effectively integrated into the team- 10% of the time. REQUIREMENTS: - Bachelors in Computing Security, Computer Science, Information Technology, or a closely related field.- 3 y. exp. as an Information Security Analyst using OSINT, OWASP Top 10, SentinelOne, Stellar Cyber, Vulnerability Scanning Solutions, Proofpoint, GCS SOAR Platform, Digital Forensic Tools, Python, Linux, and Windows. *May Telecommute.