Related skills
powershell python siem edr threat huntingπ Description
- Identify, analyze, and operationalize emerging cyber threats enterprise-wide.
- Integrate threat intelligence into detection and response improvements.
- Partner with SOC, DevSecOps, Architecture, and Engineering to improve alert fidelity.
- Translate attacker behaviors into defensive strategies; reduce false positives.
- Leverage MITRE ATT&CK and telemetry to shape detections and workflows.
- Build threat modeling, repeatable workflows, and cross-functional playbooks.
π― Requirements
- Bachelor's degree in Information Security/Cybersecurity or related field (or equivalent).
- 3β5 years in threat intelligence, SOC analysis, threat hunting, or detection engineering.
- Strong knowledge of MITRE ATT&CK framework and TTPs.
- Experience with SIEM, EDR, cloud, and identity telemetry for threat investigations.
- Hypothesis-driven threat hunting and translating findings into actionable improvements.
- Experience analyzing and operationalizing threat intel from internal and external sources.
- Scripting or automation experience (Python/PowerShell) preferred.
- Certifications such as CISM, CISA, GCTI, CTIA, or CEH are a plus.
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest β finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!