Technical Account Manager — OneAxiom (via Remotesome)
About OneAxiom
Founded in 2017, OneAxiom has emerged as a premier provider of cybersecurity solutions, expertly specializing in comprehensive monitoring and alerting for all types of data, structured or unstructured. As an integral extension of your team, we provide real-time insights into your cybersecurity risks, threats, and active attacks.
Our flagship solution offers a holistic view of your critical IT and security data through a seamless, unified platform. Forget the inefficiencies of juggling multiple tools that slow your detection (MTTD) and response times (MTTR). The OneAxiom platform serves as your definitive source of truth, delivering unmatched visibility across both on-premise and cloud environments to safeguard your data, endpoints, and infrastructure.
Overview
The Technical Account Manager (TAM) is a senior customer-facing role responsible for building trusted relationships with MSSP clients, serving as their primary technical point of contact. This position combines the duties of advanced SOC threat detection and incident response with proactive management of customer technical requests, onboarding, and advisory functions. The TAM will leverage deep security operations expertise to drive adoption and maturity of service offerings, provide technical leadership, guide investigations, and ensure a world-class customer experience. Regular meetings with clients, incident reviews, reporting, and continuous improvement activities are core responsibilities.
Experience
• 3+ years in cybersecurity, including T2/3 SOC analyst or incident response roles • Direct experience managing client relationships and technical advisory in MSSP or MDR environments
• Technical leadership in detection, response, and investigations (SIEM, EDR, IDS/IPS, Firewalls)
• Leading or mentoring SOC teams and analysts
• Hands-on threat hunting, triage, incident management, and forensic analysis
• Exposure to regulated industries (PCI DSS, HIPAA, ISO 27001 frameworks)
• Delivering client onboarding, playbooks, enablement sessions, and technical reviews
Knowledge
• Expert understanding of SOC workflows, detection technologies, escalation, and investigation processes
• Deep familiarity with SIEM, EDR, IDS/IPS, firewall platforms, and threat intelligence sources
• Security incident response playbooks and root cause analysis techniques
• Current threat landscape, attack methodologies, and defense strategies
• Understanding of compliance frameworks and risk management (PCI DSS, HIPAA, ISO 27001)
• Knowledge of customer success processes and proactive value realization
Education
• Bachelor’s degree in computer science, Information Security, or related field (or equivalent experience)
• Recognized security certifications (CISSP, GCIA, GCIH, CEH, etc.)
Skills
• Exceptional communication (verbal and written) and presentation skills for both technical and executive audiences
• Strong analytical, troubleshooting, and technical problem-solving capabilities
• Project management, organizational, and proactive customer engagement abilities
• Relationship building and ability to influence stakeholder outcomes[3][5]
• Leadership, coaching, and mentoring of technical teams
• Ability to translate business requirements into technical solutions and drive continuous process improvement
• Self-motivated, resourceful, and capable of prioritizing multiple initiatives in a fast-paced environment
Required Skills
- SIEM — Advanced
- SOC — Advanced
- EDR — Advanced
- IDS/IPS — Advanced
Benefits
- PERFORMANCE BONUS
Compensation
$60K – $80K/year
Timezone: UTC-8 to UTC-5
Compare gig platforms, read honest reviews, and find the right fit for your skills.
