Related skills
azure aws cloud security incident response siem๐ Description
- Real-Time monitoring of security alerts across SIEM, EDR, cloud, and email.
- Initial triage to set priority, severity, and potential impact.
- Follow SOPs to investigate, validate, and classify alerts.
- Escalate validated incidents to L2 for deeper investigation.
- Document triage steps, findings, and communications in the ticketing system.
- Use SOAR playbooks and core tools to enrich alerts and gather data.
๐ฏ Requirements
- Bachelor's degree in CS/Info Security or equivalent practical experience/certs.
- 0-2 years in IT, NOC, or security ops.
- Willingness to work in a 24/7 rotational shift environment.
- Core skills: attention to detail, analytical thinking, clear communication.
- Basic networking (TCP/IP) and cloud security knowledge (AWS/Azure).
- Eagerness to learn SOAR, SIEM, EDR; CompTIA Security+/Network+ preferred.
๐ Benefits
- Be at the forefront of a cloud-focused Security Operations Center.
- Excellent training and mentorship to build a cybersecurity career.
- Foundational experience with cloud security, automation, and threat intelligence.
- Clear career path to L2, L3, and senior roles.
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest โ finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!