Added
6 days ago
Type
Full time
Salary
Salary not provided

Related skills

splunk incident response siem soc mitre att&ck

๐Ÿ“‹ Description

  • Perform initial triage and advanced analysis across endpoint, SIEM, server, and network.
  • Proactively investigate client environments to detect malicious activity.
  • Conduct incident investigations and deep-dive threat analysis.
  • Map MITRE ATT&CK techniques to client use cases.
  • Triage, review, and provide log data for SIEM insights and escalation.
  • Communicate clearly and stay up-to-date on threat landscape.

๐ŸŽฏ Requirements

  • 3+ years of IT security experience.
  • Experience with EDR tools (SentinelOne, CrowdStrike, Defender).
  • Advanced knowledge of SIEM (Splunk).
  • Experience in SOC and Incident Response activities.
  • Knowledge of SIEM correlation, use cases, and events.
  • Holds at least one security certification (Sec+, CEH, SC-200, cloud cert).
Share job

Meet JobCopilot: Your Personal AI Job Hunter

Automatically Apply to All Other Jobs. Just set your preferences and Job Copilot will do the rest โ€” finding, filtering, and applying while you focus on what matters.

Related All Other Jobs

See more All Other jobs โ†’