Related skills
azure aws kubernetes gcp siem๐ Description
- Final escalation point for complex incidents from L1/L2 analysts.
- Forensic analysis of compromised systems, containers, malware, and network activity.
- Lead response to high-severity incidents in cloud environments (AWS/Azure).
- Analyze and correlate data from SIEM, EDR, CSPM, and logs; proactively hunt threats.
- Design and maintain automated SOAR playbooks; develop AI agents; API integrations.
- Mentor L1/L2 analysts; create SOPs/runbooks; analyze trends to improve security posture.
๐ฏ Requirements
- Bachelor's degree in Computer Science, Information Security, or a related field.
- 6โ10 years in Security Operations; โฅ4 years as senior analyst/threat hunter/L2/L3.
- Strong Cloud Security skills: hands-on with monitoring and incident response in AWS, Azure, or GCP.
- Strong Automation & AI skills: write automation scripts and AI-based SOC automations.
- Technical: hands-on with SOAR platforms (CrowdStrike Fusion, Splunk SOAR) and SIEMs (Splunk, QRadar, CrowdStrike Falcon).
- MITRE ATT&CK expertise and application to threat hunting/detection engineering.
๐ Benefits
- Be at the forefront of a cloud-focused SOC.
- Lead automation strategy for scalable SOC.
- Work with cutting-edge cloud security, automation, and threat intel tech.
- Collaborate with world-class security and engineering leaders in a high-impact role.
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Operations Jobs. Just set your
preferences and Job Copilot will do the rest โ finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!