Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailYour daily tasks:
Monitoring security telemetry and alerts across systems endpoints cloud and network infrastructure.
Investigating suspicious activities triaging incidents and supporting containment and remediation actions.
Correlating logs threat intel and behavioral signals to identify real threats and reduce noise.
Working closely with our external SOC to validate escalations provide context and lead follow-up investigations.
Developing and tuning detection rules and use cases in SIEM and EDR platforms.
Supporting threat hunting and hypothesis-driven exploration of suspicious activity.
Participating in incident response lifecycle documentation RCA lessons learned.
Collaborating with internal teams (IT Cloud Dev Production) to strengthen defensive posture.
Maintaining detection playbooks runbooks and response guides.
Qualifications :
Solid experience in hands-on security operations threat detection or incident response.
Familiarity with log sources and telemetry: authentication endpoint DNS cloud firewall etc.
Proficiency in using at least one SIEM or EDR platform (e.g. Sentinel Splunk CrowdStrike Qualys EDR).
Understanding of attack tactics (MITRE ATT&CK) and ability to map detection logic.
Practical knowledge of operating systems (Windows GNU/Linux macOS) from a security perspective.
Analytical mindset curiosity and structured approach to problem-solving.
Very good command of English.
Nice to have:
Experience with threat hunting purple teaming or custom rule development.
Exposure to cloud environments (AWS/GCP/Azure) and their security telemetry.
Familiarity with SOAR platforms and automated response logic.
Hands-on knowledge of scripting (e.g. Python PowerShell KQL SPL).
Security certifications such as GCIH GCFA or MITRE ATT&CK Defender.
Additional Information :
What we can offer:
Remote Work :
No
Employment Type :
Full-time
Full-time