Added
17 days ago
Location
Type
Full time
Salary
Salary not provided
Related skills
azure aws gcp siem edr๐ Description
- Perform daily alert investigation and response in a hybrid environment.
- Lead incidents of medium size and complexity.
- Analyze alerts across complex ecosystems and update stakeholders.
- Create and maintain runbooks to support a growing team.
- Design and improve detection use cases and threat models.
- Collaborate across teams to mitigate risk and drive improvements.
๐ฏ Requirements
- 5+ years in Security Operations, including alert triage and investigation.
- 2+ years of detection and tuning within Security Operations.
- 2+ years of Security Incident Response experience.
- On-call and occasional off-hours incident response availability.
- Proficiency in log analysis, live response, and forensics.
- Understanding attacker TTPs and cloud/native investigations.
๐ Benefits
- Stock options to share in the company's success.
- Fertility and family-building benefits.
- Work-life balance and You Time with generous PTO.
- Education budget to grow skills.
- Wellbeing stipend and phone/internet stipend.
- Equipment stipend for hybrid or distributed work.
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Operations Jobs. Just set your
preferences and Job Copilot will do the rest โ finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!