Manager - Security Operations Center

Requisition ID
Category (Portal Searching)
Information Technology


Inovalon is a leading technology company that combines advanced cloud-based data analytics and data-driven intervention platforms to achieve meaningful insight and impact in clinical and quality outcomes, utilization, and financial performance across the healthcare landscape. Inovalon's unique achievement of value is delivered through the effective progression of Turning Data into Insight, and Insight into Action.


The Information Security Manager – Security Operation Center (SOC) is responsible for the monitoring of and response to security events within the Inovalon environment. The successful candidate will participate in continuous monitoring efforts, analyzing and prioritizing those events with security implications, while also responding to those events which rise to the level of incidents.


  • Develop and maintain Standard Operating Procedures for security analyst roles and responsibilities;
  • Maintain deployed security technologies providing accurate, detailed configurations, repeatable processes, all under change management control;
  • Provide analysis and trending of security log data from a large number of heterogeneous security devices;
  • Develop processes that analyze data and produce accurate, meaningful, easily interpreted results based on user requirements and use cases;
  • Conduct product evaluations of security technologies as directed. Develop product comparisons and detailed reports. Make recommendations to management appropriate to an organizations needs and requirements;
  • Ability to manage a small team of people and drive process improvement in the SOC;
  • Provide 1st and 2nd -level troubleshooting support for security applications and appliances; 
  • Develop policies, procedures and standards that meet existing and newly developed policy and regulatory requirements including SOX, PCI and HiTrust;
  • Responsible for working in a 24x7 Security Operation Center (SOC) environment;
  • Provide Incident Response (IR) support when analysis confirms actionable incident;
  • Provide threat and vulnerability analysis as well as security advisory services; and
  • Analyze and respond to previously undisclosed software and hardware vulnerabilities.


  • Bachelor of Science in a technical discipline or equivalent demonstrated experience and knowledge;
  •  Minimum 7 years of information security and 5 years’ experience in an analysis and response role or security operation center environment;
  • Demonstrated experience in the monitoring, analysis and triage of network events in a high volume and fast paced environment;
  • Demonstrated cyber incident handling experience to include the application of lessons learned;
  • Knowledge of various security methodologies and processes, and technical security solutions (firewall, intrusion prevention and intrusion detection systems);
  • Knowledge of TCP/IP Protocols, network analysis, and network/security applications;
  • Knowledge of common Internet protocols and applications;
  • In-depth experience reviewing raw log files and performing data correlation/analysis, such as firewall, IDS, and system logs;
  • Experience utilizing, tuning and developing procedures for SIEM tools (SPLUNK, SolarWinds LEM);
  • Experience with Data Loss Prevention (DLP) tools including; SourceFire, FireEye, Forcepoint (Websense), McAfee EPO;
  • In-depth knowledge of current threat actors, techniques and trends in cyber security;
  • Knowledge and working experience as a user and/or admin of SIEM technology solutions; and
  • Possession of industry certifications is preferred, examples include: CISSP, CEH, GCIH, GCIA or similar.

Inovalon provides equal employment opportunities (EEO) to all employees and applicants for employment. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, or protected veteran status and will not be discriminated against on the basis of disability.


Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed