Added
2 days ago
Type
Full time
Salary
Salary not provided

Related skills

azure aws python kubernetes gcp

πŸ“‹ Description

  • Act as final escalation point for complex incidents (L1/L2).
  • Lead investigations into high-severity events across AWS, Azure, Kubernetes.
  • Perform forensic analysis across endpoints, cloud workloads, and network telemetry.
  • Design, build, and maintain automated SOAR playbooks to speed responses.
  • Build automation scripts (Python, Go, etc.) for enrichment and containment.
  • Mentor junior analysts and strengthen SOC capabilities.

🎯 Requirements

  • Bachelor's degree in CS, Cybersecurity, or related field (or equivalent).
  • Senior-level Security Operations experience (analyst, threat hunter, or L3).
  • Cloud security monitoring and incident response across AWS, Azure, and GCP.
  • Scripting/automation: Python, Go, PowerShell, Bash.
  • SOAR platforms and SIEMs (CrowdStrike, Splunk, QRadar, Sentinel).
  • EDR tooling, forensics, and detection engineering knowledge.
  • MITRE ATT&CK knowledge and application to threat detection.
  • Mentorship and SOC process/docs maintenance.

🎁 Benefits

  • Certification support for CEH, GIAC and related training.
  • Exposure to a global Infosec team and modern SOC tooling.
Share job

Meet JobCopilot: Your Personal AI Job Hunter

Automatically Apply to Engineering Jobs. Just set your preferences and Job Copilot will do the rest β€” finding, filtering, and applying while you focus on what matters.

Related Engineering Jobs

See more Engineering jobs β†’