Added
24 minutes ago
Type
Full time
Salary
Salary not provided

Related skills

splunk siem elk google cloud platform soar

πŸ“‹ Description

  • Identify and respond to security incidents on a global scale.
  • Act as incident commander to drive incidents through the response lifecycle.
  • Design and maintain security alerts, automation, playbooks and escalation workflows.
  • Conduct threat hunting and maintain forward-looking strategies for tools and processes.
  • Research threat intelligence reports, triage and manage resulting workflows.
  • Partner with stakeholders to ensure continuous improvement across the full incident lifecycle.
  • Participate in on-call rotation.

🎯 Requirements

  • 5+ years in global security incidents or SOC/PSIRT/CSIRT.
  • SIEM expertise: ELK, Google BigQuery, Splunk.
  • Threat intelligence integration for detection engineering.
  • SOAR platforms: Tines, Splunk SOAR.
  • Excellent communication and leadership; cross-functional partnership.
  • Software development or engineering operations experience; B.S. helpful.
  • Cloud experience: GCP, AWS, Azure.

🎁 Benefits

  • Generous performance-based bonus plans for eligible employees
  • Rich medical, dental, and vision coverage
  • Generous retirement contributions with immediate vesting
  • Quarterly company-wide wellness days
  • Country-specific holidays plus a birthday day off
  • One-time home office stipend
Share job

Meet JobCopilot: Your Personal AI Job Hunter

Automatically Apply to Engineering Jobs. Just set your preferences and Job Copilot will do the rest β€” finding, filtering, and applying while you focus on what matters.

Related Engineering Jobs

See more Engineering jobs β†’