This job offer is no longer available
About
Conduct deep investigations into security events Correlate data across multiple platforms Lead incident response activities for moderate-complexity threats Refine detection logic and improve SOC workflows Provide guidance to Level I analysts Utilize Crowdstrike, Azure/M365, Elastic/Kibana for event correlation Lead investigations for escalated alerts Perform containment actions following established procedures Review and tune detections and alerts Participate in threat hunting missions Document incident timelines and root causes Maintain awareness of current threats and security policies Requirements:
Minimum 3 years experience in cyber security analysis or a related role Foundational understanding of networking, operating systems, and security principles Strong knowledge of security event triage, threat indicators, and common attack techniques (MITRE ATT&CK familiarity preferred) Experience and working knowledge in: Azure/M365 Security, CrowdStrike Falcon, Elastic/Kibana, JIRA, and Endpoint/Network Security Fundamentals Experience performing incident containment and coordinating with IT or cloud engineering teams Ability to read and interpret logs from endpoints, cloud systems, email security tools, and authentication platforms Basic understanding of Windows and Linux system behaviors Familiarity with phishing indicators, malware behaviors, user account anomalies, and suspicious network activity Strong analytical thinking and problem-solving skills Ability to work in a fast-paced 24/7 SOC environment Clear written communication for documenting investigations High attention to detail and disciplined adherence to procedures Benefits:
Health, dental, and vision insurance Life insurance Paid time-off benefits Flexible spending account 401(k) with employer match Employee Stock Purchase Plan (ESPP)
Languages
- English
Notice for Users
This job was posted by one of our partners. You can view the original job source here.