Related skills
tcp/ip siem firewalls edr active directory๐ Description
- Monitor and analyze security events and alerts; advise remediation actions.
- Review incident impact and remediation actions; ensure containment.
- Create and improve monitoring alerts in SIEM.
- Perform deep analysis of security incidents to identify root causes.
- Investigate intrusion attempts; correlate sources; determine affected systems.
- Operate in a 24/7 rotation shift.
๐ฏ Requirements
- Bachelor's degree in CS/IS or 5+ years in SOC/IR/Forensics.
- Decode logs from security devices (Firewall, Proxy, EDR).
- 3+ years in SOC/IR; day-to-day incident handling.
- L1 ticket analysis; determine false positives. OSI knowledge; network architecture; logs; IDS/HIDS familiarity.
- Malware categories and remediation; cross-functional collaboration.
๐ Benefits
- Inclusive culture with employee resource groups.
- Equal opportunity employer.
- Remote work with a global, diverse team.
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest โ finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!