Related skills
splunk incident response siem soc mitre att&ck๐ Description
- Perform initial triage and advanced analysis across endpoint, SIEM, server, and network.
- Proactively investigate client environments to detect malicious activity.
- Conduct incident investigations and deep-dive threat analysis.
- Map MITRE ATT&CK techniques to client use cases.
- Triage, review, and provide log data for SIEM insights and escalation.
- Communicate clearly and stay up-to-date on threat landscape.
๐ฏ Requirements
- 3+ years of IT security experience.
- Experience with EDR tools (SentinelOne, CrowdStrike, Defender).
- Advanced knowledge of SIEM (Splunk).
- Experience in SOC and Incident Response activities.
- Knowledge of SIEM correlation, use cases, and events.
- Holds at least one security certification (Sec+, CEH, SC-200, cloud cert).
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to All Other Jobs. Just set your
preferences and Job Copilot will do the rest โ finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!