Added
less than a minute ago
Type
Full time
Salary
Salary not provided

Related skills

azure aws kubernetes gcp siem

๐Ÿ“‹ Description

  • Final escalation point for complex incidents from L1/L2 analysts.
  • Forensic analysis of compromised systems, containers, malware, and network activity.
  • Lead response to high-severity incidents in cloud environments (AWS/Azure).
  • Analyze and correlate data from SIEM, EDR, CSPM, and logs; proactively hunt threats.
  • Design and maintain automated SOAR playbooks; develop AI agents; API integrations.
  • Mentor L1/L2 analysts; create SOPs/runbooks; analyze trends to improve security posture.

๐ŸŽฏ Requirements

  • Bachelor's degree in Computer Science, Information Security, or a related field.
  • 6โ€“10 years in Security Operations; โ‰ฅ4 years as senior analyst/threat hunter/L2/L3.
  • Strong Cloud Security skills: hands-on with monitoring and incident response in AWS, Azure, or GCP.
  • Strong Automation & AI skills: write automation scripts and AI-based SOC automations.
  • Technical: hands-on with SOAR platforms (CrowdStrike Fusion, Splunk SOAR) and SIEMs (Splunk, QRadar, CrowdStrike Falcon).
  • MITRE ATT&CK expertise and application to threat hunting/detection engineering.

๐ŸŽ Benefits

  • Be at the forefront of a cloud-focused SOC.
  • Lead automation strategy for scalable SOC.
  • Work with cutting-edge cloud security, automation, and threat intel tech.
  • Collaborate with world-class security and engineering leaders in a high-impact role.
Share job

Meet JobCopilot: Your Personal AI Job Hunter

Automatically Apply to Operations Jobs. Just set your preferences and Job Copilot will do the rest โ€” finding, filtering, and applying while you focus on what matters.

Related Operations Jobs

See more Operations jobs โ†’