Related skills
ai incident response threat intelligence siem edrπ Description
- Monitor and triage security alerts across SIEM, EDR, CSPM for all environments.
- Investigate alerts to determine scope, severity, and escalation needs.
- Leverage AI-assisted triage and enrichment tools to speed analysis.
- Classify, document, and track alerts through full lifecycle with ticketing.
- Participate in or lead incident response engagements from detection to remediation.
- Detect, triage, and respond to incidents using AI-enabled workflows.
π― Requirements
- 2+ years in SOC, security operations, or incident response.
- Understanding MITRE ATT&CK, network protocols, and endpoint behavior.
- Experience with SIEM and writing detection queries.
- Familiarity with EDR and cloud IaaS environments.
- Comfort using AI systems in security workflows.
- Strong written communication for technical and non-technical audiences.
π Benefits
- Diversity and inclusion are core values.
- We care for employees and support growth.
- Collaborative culture with continuous learning.
- Opportunities to shape AI/automation in security.
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Operations Jobs. Just set your
preferences and Job Copilot will do the rest β finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!