HamburgerMenu
hirist

Job Description

What You Will Do :

- Triage alerts and investigates incidents across SIEM, EDR and network data sources.

- Perform forensic analysis, identify root causes and recommend containment and remediation steps.

- Proactively hunt for unknown threats using MITRE ATT&CK and threat intelligence feeds.

- Tune detection rules and provide feedback to improve automation and detection accuracy.

- Develop incident response playbooks and mentor junior analysts.

- Support vulnerability management and compliance activities (HIPAA, GDPR, etc.).

What makes you a great fit :

- 3-7 years SOC experience in L2/L3 incident response and threat hunting.

- Hands-on with SIEM (e.g., Splunk, QRadar), EDR (e.g., CrowdStrike) and SOAR tools.

- Strong knowledge of OS, networking and log analysis; scripting skills (Python, PowerShell) preferred.

- Familiar with MITRE ATT&CK, cyber kill chain and IR frameworks.

- Excellent communication and collaboration skills; mentoring experience is a plus.

- Relevant degree or certifications preferred.

Why join us :

- Influence next-gen AI-driven security products.

- Grow into a SOC leadership role.

- Continuous learning in a fast-evolving threat landscape.


info-icon

Did you find something suspicious?