Related skills
bigquery aws gcp splunk edrπ Description
- Identify and respond to security incidents globally.
- Act as incident commander to drive incidents through the lifecycle.
- Design and maintain security alerts, playbooks, and escalation workflows.
- Conduct threat hunting and preempt future threats with tools/tech.
- Research threat intelligence reports, triage and manage related workflows.
- Partner with stakeholders to improve prep, analysis, containment, and post-mortem activities.
- Participate in on-call rotation.
π― Requirements
- 5+ years managing security incidents at global scale (SOC/PSIRT/CSIRT).
- SIEM with ELK, Splunk, BigQuery; Splunk proficiency preferred.
- Endpoint detection and investigation expertise; hands-on with EDR tools.
- SOAR platforms such as Tines or Splunk SOAR.
- Strong communication and leadership; ability to partner with stakeholders.
- Software development or engineering operations experience; B.S. helpful.
- Cloud technologies such as GCP, AWS, Heroku, or Azure.
- Ownership and Accountability
- Autonomy
- High Level of Integrity
- Clear Communication
- Creative Problem Solver
- Passionate about Security
π Benefits
- Generous performance-based bonus plans.
- Rich medical, dental, and vision coverage.
- Generous retirement contributions with 100% immediate vesting.
- Quarterly all-company wellness days.
- Country specific holidays plus a day off for your birthday.
- One-time home office stipend.
- Annual professional development budget.
- Quarterly well-being stipend.
- Considerable paid parental leave.
- Employee referral bonus program.
- Other benefits (life/AD&D, disability, EAP) vary by country.
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest β finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!