Security Analyst II, Splunk

Added
2 days ago
Type
Full time
Salary
Salary not provided

Related skills

splunk incident response siem microsoft defender mitre att&ck

📋 Description

  • Triage and perform advanced analysis across endpoints, SIEM, servers, and networks.
  • Conduct proactive security investigations across client environments to detect malicious activity.
  • Investigate incidents and perform deep-dive analyses on threats.
  • Identify indicators of attack and compromise in alerts through data hunting and reviews.
  • Map clients' use cases to MITRE ATT&CK tactics and techniques.
  • Triage and review logs for insight and escalation recommendations in SIEM.
  • Strong written and oral communication skills.
  • Maintain up-to-date knowledge of the current threat landscape.

🎯 Requirements

  • 3+ years of IT security experience.
  • Experience with EDR tools (SentinelOne, CrowdStrike, Defender, etc.).
  • Advanced knowledge of SIEM (Splunk).
  • Experience in SOC and Incident Response.
  • Understanding SIEM correlation, use cases and events.
  • One industry certification (e.g., Security+, CEH, SC-200).
  • Basic scripting or development experience is a plus.
Share job

Meet JobCopilot: Your Personal AI Job Hunter

Automatically Apply to Engineering Jobs. Just set your preferences and Job Copilot will do the rest — finding, filtering, and applying while you focus on what matters.

Related Engineering Jobs

See more Engineering jobs →