Related skills
cloud incident response log analysis threat intelligence siemπ Description
- Review and respond to alerts from Elastic Detection Engine and monitoring sources.
- Provide feedback to Threat Detection to improve detections and automation.
- Analyze SIEM and endpoint logs during complex investigations.
- Develop innovative approaches to detect, respond to, and eradicate advanced threats.
- Identify integration points for event enrichment and automated response.
- Leverage Threat Intelligence to add context for security events.
π― Requirements
- At least 3 years in security operations / incident response in a global environment.
- SaaS and cloud experience is a plus.
- Strong log and system analysis (IR, SRE, Sys Admin); Elastic Stack a plus.
- Innovative thinker; interest in AI/ML to optimize security processes.
- Experience coordinating cross-team responses to IT/security incidents.
- Eligible for DoD IL4+ cloud environments.
π Benefits
- Base salary: 133,100β210,600 USD.
- Select locations: 159,900β252,900 USD.
- Stock program eligible.
- 401(k) with 6% match.
- Generous vacation days.
- Volunteer time and donation matching.
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest β finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!