More jobs:
Job Description & How to Apply Below
Analyze and respond to complex security alerts and incidents.
Perform root-cause analysis, containment, eradication, and recovery.
Escalate critical incidents to security management when needed.
Threat Hunting & Analysis:
Proactively search for indicators of compromise (IoCs).
Correlate events across SIEM tools and other systems.
Investigate anomalies and unusual network or user behaviors.
Security Monitoring:
Review alerts from SIEM tools (e.g., Splunk, QRadar, Sentinel).
Fine-tune detection rules and correlation logic to reduce false positives.
Work with L1 & L2 team to improve alert quality and triage efficiency.
Vulnerability & Patch Management:
Analyze vulnerability scans and coordinate remediation with IT teams.
Verify patch compliance and report deviations.
Endpoint & Network Security:
Monitor and manage EDR tools (e.g., Crowd Strike, Defender, Carbon Black).
Respond to malware infections, phishing attempts, and suspicious network traffic.
Access & Identity Management:
Review privileged access controls and segregation of duties.
Investigate unauthorized access attempts or identity compromise indicators.
Forensics & Reporting:
Perform log analysis and evidence collection for incidents.
Document findings, prepare post-incident reports, and recommend preventive actions.
Automation & Process Improvement:
Support SOAR (Security Orchestration, Automation, and Response) workflows.
Develop playbooks and improve existing runbooks for faster resolution.
Collaboration & Mentorship:
Guide L1 & L2 analysts on triage and escalation.
Collaborate with SOC managers, and IT operations teams.
Technical
Skills:
SIEM Tools:
Splunk, QRadar, Microsoft Sentinel, Arc Sight, etc.
EDR/XDR:
Crowd Strike, Carbon Black, Defender ATP, Tanium, etc.
SOAR Tools:
Palo Alto Cortex XSOAR, Splunk SOAR, etc.
Firewalls & IDS/IPS:
Palo Alto, Cisco, Fortinet, Snort, Suricata.
Vulnerability Tools:
Qualys, Tenable, Rapid
7.
Cloud Security: AWS Guard Duty, Azure Security Center, GCP SCC.
Scripting:
Basic Python, Power Shell, or Bash for automation.
Operating Systems:
Windows, Linux, macOS security fundamentals
Work Timing:
Complete EST Hours
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
Search for further Jobs Here:
×