Added
6 days ago
Type
Full time
Salary
Upgrade to Premium to se...

Related skills

azure aws gcp splunk log analysis

πŸ“‹ Description

  • Perform daily alert investigation and response in a hybrid environment.
  • Collaborate with the team and actively assist in major response exercises.
  • Conduct detail-oriented analysis across challenging and complex ecosystems.
  • Take ownership of tuning, refinement, and development of detection use cases.
  • Drive continuous improvement across all aspects of threat detection and response.
  • Identify systemic issues and collaborate on root causes.

🎯 Requirements

  • 3+ years of Security Operations or Incident Response experience.
  • Proficiency in log analysis, live response, and forensics.
  • Strong understanding of attacker Tactics, Techniques, and Procedures.
  • Experience with security tech (SIEM, EDR, Antivirus, Email).
  • Experience investigating cloud environments (AWS, GCP, Azure) and SaaS logs.
  • Hands-on malware analysis using dynamic and static tools.

🎁 Benefits

  • Stock options for employees.
  • Healthcare covering 100% of employee premiums.
  • Fertility and family-building benefits.
  • Generous PTO including vacation, sick, education, and volunteer days.
  • Company-paid parental leave.
  • Education budget and wellbeing stipend.
Share job

Meet JobCopilot: Your Personal AI Job Hunter

Automatically Apply to Engineering Jobs. Just set your preferences and Job Copilot will do the rest β€” finding, filtering, and applying while you focus on what matters.

Related Engineering Jobs

See more Engineering jobs β†’