Related skills
azure aws python kubernetes gcpπ Description
- Act as final escalation point for complex incidents (L1/L2).
- Lead investigations into high-severity events across AWS, Azure, Kubernetes.
- Perform forensic analysis across endpoints, cloud workloads, and network telemetry.
- Design, build, and maintain automated SOAR playbooks to speed responses.
- Build automation scripts (Python, Go, etc.) for enrichment and containment.
- Mentor junior analysts and strengthen SOC capabilities.
π― Requirements
- Bachelor's degree in CS, Cybersecurity, or related field (or equivalent).
- Senior-level Security Operations experience (analyst, threat hunter, or L3).
- Cloud security monitoring and incident response across AWS, Azure, and GCP.
- Scripting/automation: Python, Go, PowerShell, Bash.
- SOAR platforms and SIEMs (CrowdStrike, Splunk, QRadar, Sentinel).
- EDR tooling, forensics, and detection engineering knowledge.
- MITRE ATT&CK knowledge and application to threat detection.
- Mentorship and SOC process/docs maintenance.
π Benefits
- Certification support for CEH, GIAC and related training.
- Exposure to a global Infosec team and modern SOC tooling.
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest β finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!