Related skills
log analysis siem soc telemetry threat hunting๐ Description
- Define the value of a log and optimize SIEM log processing for security value.
- Support security capabilities; implement layered defense from multiple log sources.
- Lead vendor log source detection strategies.
- Hunt threat actors to uncover initial access, abuse, and persistence.
- Test attack paths; develop high-efficacy detections and product requirements.
- Safely test exploitation; develop PoC exploits for identified vulnerabilities.
๐ฏ Requirements
- Understand various log types and correlate to attacker tradecraft.
- Deployed and matured SIEM technology (vendor-agnostic, preferred).
- Proven threat hunting in SIEM platforms with top vendor log sources.
- Developed proofs of concept and attack simulations to generate logs.
- Experience working in a SOC and building metrics-driven tuning.
- Translate MITRE TTPs to customer value propositions.
๐ Benefits
- 100% remote work environment
- Generous PTO (vacation, sick time, holidays)
- 12 weeks paid parental leave
- Comprehensive medical, dental, vision benefits
- 401(k) with 5% company contribution
- Stock options for all full-time employees
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest โ finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!