Related skills
aws splunk threat intelligence siem elkπ Description
- Identify and respond to security incidents globally.
- Act as incident commander through the full response lifecycle.
- Design and maintain security alerts, playbooks, and workflows for 24/7 incident response.
- Conduct threat hunting and forward-looking strategies for tooling.
- Research threat intelligence and triage resulting workflows.
- Collaborate with stakeholders to improve preparedness and response.
- Participate in on-call rotation.
π― Requirements
- 5+ years managing global security incidents (SOC/PSIRT/CSIRT).
- SIEM experience with ELK, Google BigQuery, Splunk; Splunk preferred.
- Threat intelligence integration for detection engineering.
- SOAR platforms such as Tines or Splunk SOAR.
- Excellent communication and stakeholder partnership.
- Software/engineering ops experience; tech degree helpful.
- Cloud experience (GCP, AWS, Azure).
π Benefits
- Generous performance bonus plans.
- Medical, dental, and vision coverage.
- Retirement contributions with immediate vesting.
- Quarterly all-company wellness days.
- Country-specific holidays plus birthday off.
- One-time home office stipend.
- Annual professional development budget.
- Quarterly well-being stipend.
- Paid parental leave.
- Employee referral bonus program.
- Other benefits (life/AD&D, disability, EAP, etc.).
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest β finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!