This job offer is no longer available
About
Ensure you read the information regarding this opportunity thoroughly before making an application.
Key Responsibilities Monitor and analyze security events across SIEM, EDR, IDS/IPS, and threat intelligence platforms Investigate and respond to security incidents, including phishing, malware, and policy violations Perform deep-dive threat analysis and determine root cause and impact Create detailed incident reports, timelines, and remediation recommendations Tune detection rules and improve SOC playbooks and workflows Collaborate with engineering teams for tool optimization and integrations Conduct proactive threat hunting using latest TTPs (MITRE ATT&CK aligned) Act as a subject matter expert (SME) for security services across state agencies Document runbooks, processes, and troubleshooting procedures Required Skills 2+ years of experience in
Security Monitoring and Incident Response 2+ years of experience with
MITRE ATT&CK framework 2+ years of experience in
dashboard creation and reporting Preferred Skills Experience with
Palo Alto Cortex XSIAM/XDR Knowledge of
Linux , network administration, and network design Experience with: xywuqvp Firewalls VPN technologies Active Directory IDS/IPS systems Education & Certifications Required: Associate's degree in IT / Information Security OR Equivalent experience (4 years in lieu of degree) 2+ years supporting large SOC operations Preferred: Certifications such as: CISSP / CISA / CISO CEH / OSCP / GPEN Vendor-specific security certifications
Languages
- English
Notice for Users
This job was posted by one of our partners. You can view the original job source here.