Related skills
datadog aws python splunk soarπ Description
- Lead containment, eradication, recovery, and post-incident reviews; coordinate across teams.
- Perform forensics across disk, memory, network, and cloud to determine root cause.
- Join on-call rotation as primary after-hours incident responder.
- Own detection engineering: SIEM rules and detection pipelines; tune tools.
- Threat hunt using MITRE ATT&CK and threat intel across endpoints, network, cloud.
- Build SOAR playbooks to automate workflows; AI assisted automation with humans in loop.
π― Requirements
- Bachelor's degree in CS/Cybersecurity/Info Systems or related field (or equivalent).
- 5+ years in cybersecurity; 3+ years in security operations/SOC.
- Hands-on with SIEM: Splunk SPL, Microsoft Sentinel (KQL), or similar.
- EDR experience with SentinelOne preferred; cross-OS endpoint telemetry and tuning.
- Python; PowerShell and Bash a plus; SOAR platforms and automated playbooks.
- AWS security services; cloud investigations; MITRE ATT&CK; forensics; certs valued.
π Benefits
- Competitive compensation and performance rewards.
- Health & wellness: medical insurance and gym membership.
- Daily operations: meals, beverages, transport, mobile data allowance.
- Professional development: Career development budget.
- Culture & time off: hybrid model, team weeks, outing budgets.
- Leave benefits: maternity/paternity/Hajj/Umrah leave and PTO.
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest β finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!