Related skills
splunk incident response siem microsoft defender mitre att&ck📋 Description
- Triage and perform advanced analysis across endpoints, SIEM, servers, and networks.
- Conduct proactive security investigations across client environments to detect malicious activity.
- Investigate incidents and perform deep-dive analyses on threats.
- Identify indicators of attack and compromise in alerts through data hunting and reviews.
- Map clients' use cases to MITRE ATT&CK tactics and techniques.
- Triage and review logs for insight and escalation recommendations in SIEM.
- Strong written and oral communication skills.
- Maintain up-to-date knowledge of the current threat landscape.
🎯 Requirements
- 3+ years of IT security experience.
- Experience with EDR tools (SentinelOne, CrowdStrike, Defender, etc.).
- Advanced knowledge of SIEM (Splunk).
- Experience in SOC and Incident Response.
- Understanding SIEM correlation, use cases and events.
- One industry certification (e.g., Security+, CEH, SC-200).
- Basic scripting or development experience is a plus.
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest — finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!