Related skills
powershell python splunk microsoft defender mitre att&ck๐ Description
- Triage and analyze endpoints, servers, and networks.
- Threat hunting on customer networks to detect threats.
- Proactive investigations to detect malicious activity.
- Coordinate incident investigations and deep-dive analyses.
- Map MITRE ATT&CK techniques to client use cases.
- Update runbooks and documentation for repeatable analysis.
๐ฏ Requirements
- 3+ years of IT security experience.
- System administration experience (Windows, Unix/Linux, Mac)
- Advanced networking concepts; analyze network artifacts.
- Experience with EDR tools (SentinelOne, CrowdStrike, Defender).
- Advanced knowledge of SIEM (Splunk).
- Industry cert (e.g., Sec+, CEH, GCIA, OSCP) or pursuing.
- Basic scripting in Python, JavaScript, PowerShell, or Bash.
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Operations Jobs. Just set your
preferences and Job Copilot will do the rest โ finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!