Related skills
malware_analysis📋 Description
- Lead complex incident investigations and provide advanced analysis and response support.
- Conduct proactive threat hunting activities to identify emerging threats and adversary behavior.
- Perform root cause analysis and develop detailed incident reports.
- Support digital forensics and malware analysis efforts.
- Analyze endpoint, network, and identity telemetry to detect anomalous behavior.
- Integrate threat intelligence and red team findings into detection and response workflows.
🎯 Requirements
- Must be a U.S. Citizen.
- Bachelor’s degree in Cybersecurity, Information Technology, or a related field (or equivalent experience).
- 4+ years of experience in cybersecurity operations or incident response.
- Experience handling complex security incidents and conducting threat investigations.
- Experience performing threat hunting and root cause analysis.
- Experience with SIEM platforms, preferably Microsoft Sentinel.
🎁 Benefits
- Highly competitive benefits
- Professional development opportunities
- Flexible, collaborative culture and career growth
- Remote/hybrid work environment
- Equal opportunity employer
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Operations Jobs. Just set your
preferences and Job Copilot will do the rest — finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!