Added
2 minutes ago
Type
Full time
Salary
Salary not provided

Related skills

ai incident response threat intelligence siem edr

πŸ“‹ Description

  • Monitor and triage security alerts across SIEM, EDR, CSPM for all environments.
  • Investigate alerts to determine scope, severity, and escalation needs.
  • Leverage AI-assisted triage and enrichment tools to speed analysis.
  • Classify, document, and track alerts through full lifecycle with ticketing.
  • Participate in or lead incident response engagements from detection to remediation.
  • Detect, triage, and respond to incidents using AI-enabled workflows.

🎯 Requirements

  • 2+ years in SOC, security operations, or incident response.
  • Understanding MITRE ATT&CK, network protocols, and endpoint behavior.
  • Experience with SIEM and writing detection queries.
  • Familiarity with EDR and cloud IaaS environments.
  • Comfort using AI systems in security workflows.
  • Strong written communication for technical and non-technical audiences.

🎁 Benefits

  • Diversity and inclusion are core values.
  • We care for employees and support growth.
  • Collaborative culture with continuous learning.
  • Opportunities to shape AI/automation in security.
Share job

Meet JobCopilot: Your Personal AI Job Hunter

Automatically Apply to Operations Jobs. Just set your preferences and Job Copilot will do the rest β€” finding, filtering, and applying while you focus on what matters.

Related Operations Jobs

See more Operations jobs β†’