Related skills
splunk siem elk google cloud platform soarπ Description
- Identify and respond to security incidents on a global scale.
- Act as incident commander to drive incidents through the response lifecycle.
- Design and maintain security alerts, automation, playbooks and escalation workflows.
- Conduct threat hunting and maintain forward-looking strategies for tools and processes.
- Research threat intelligence reports, triage and manage resulting workflows.
- Partner with stakeholders to ensure continuous improvement across the full incident lifecycle.
- Participate in on-call rotation.
π― Requirements
- 5+ years in global security incidents or SOC/PSIRT/CSIRT.
- SIEM expertise: ELK, Google BigQuery, Splunk.
- Threat intelligence integration for detection engineering.
- SOAR platforms: Tines, Splunk SOAR.
- Excellent communication and leadership; cross-functional partnership.
- Software development or engineering operations experience; B.S. helpful.
- Cloud experience: GCP, AWS, Azure.
π Benefits
- Generous performance-based bonus plans for eligible employees
- Rich medical, dental, and vision coverage
- Generous retirement contributions with immediate vesting
- Quarterly company-wide wellness days
- Country-specific holidays plus a birthday day off
- One-time home office stipend
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest β finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!