Related skills
splunk servicenow nist mitre att&ck crowdstrike๐ Description
- Monitor security alerts and events from SIEM, EDR, IDS/IPS, and firewalls.
- Triage and analyze security events to determine severity and root cause.
- Document and escalate incidents per incident response procedures.
- Execute initial containment and remediation per playbooks.
- Maintain situational awareness of current threats and vulnerabilities.
- Provide detailed incident reports for clients and internal stakeholders.
๐ฏ Requirements
- Bachelorโs Degree or equivalent experience
- 2+ years in SOC/cybersecurity/IT security operations
- Familiarity with SIEM tools (Splunk, Sentinel, LogRhythm)
- Familiarity with EDR platforms (CrowdStrike, SentinelOne)
- Understanding of common attack vectors (phishing, ransomware, lateral movement)
- Strong analytical, investigative, and problem-solving skills
๐ Benefits
- Comprehensive medical, dental, and vision plans for you and dependents
- 401(k) with employer match, 529 College Savings Plan, HSA, Life Insurance, LTD
- Competitive compensation
- Training and development programs
- Major offices stocked with snacks and beverages
- Work-life balance and generous paid time off
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Operations Jobs. Just set your
preferences and Job Copilot will do the rest โ finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!