Added
16 minutes ago
Type
Full time
Salary
Upgrade to Premium to se...

Related skills

powershell python splunk microsoft defender mitre att&ck

๐Ÿ“‹ Description

  • Triage and analyze endpoints, servers, and networks.
  • Threat hunting on customer networks to detect threats.
  • Proactive investigations to detect malicious activity.
  • Coordinate incident investigations and deep-dive analyses.
  • Map MITRE ATT&CK techniques to client use cases.
  • Update runbooks and documentation for repeatable analysis.

๐ŸŽฏ Requirements

  • 3+ years of IT security experience.
  • System administration experience (Windows, Unix/Linux, Mac)
  • Advanced networking concepts; analyze network artifacts.
  • Experience with EDR tools (SentinelOne, CrowdStrike, Defender).
  • Advanced knowledge of SIEM (Splunk).
  • Industry cert (e.g., Sec+, CEH, GCIA, OSCP) or pursuing.
  • Basic scripting in Python, JavaScript, PowerShell, or Bash.
Share job

Meet JobCopilot: Your Personal AI Job Hunter

Automatically Apply to Operations Jobs. Just set your preferences and Job Copilot will do the rest โ€” finding, filtering, and applying while you focus on what matters.

Related Operations Jobs

See more Operations jobs โ†’