Related skills
azure aws gcp splunk log analysisπ Description
- Perform daily alert investigation and response in a hybrid environment.
- Collaborate with the team and actively assist in major response exercises.
- Conduct detail-oriented analysis across challenging and complex ecosystems.
- Take ownership of tuning, refinement, and development of detection use cases.
- Drive continuous improvement across all aspects of threat detection and response.
- Identify systemic issues and collaborate on root causes.
π― Requirements
- 3+ years of Security Operations or Incident Response experience.
- Proficiency in log analysis, live response, and forensics.
- Strong understanding of attacker Tactics, Techniques, and Procedures.
- Experience with security tech (SIEM, EDR, Antivirus, Email).
- Experience investigating cloud environments (AWS, GCP, Azure) and SaaS logs.
- Hands-on malware analysis using dynamic and static tools.
π Benefits
- Stock options for employees.
- Healthcare covering 100% of employee premiums.
- Fertility and family-building benefits.
- Generous PTO including vacation, sick, education, and volunteer days.
- Company-paid parental leave.
- Education budget and wellbeing stipend.
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest β finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!