Respond, analyze, and remediate incidents escalated from the managed SOC and internal stakeholders
Investigate potential phishing emails and suspicious web content
Assist the Security Operations Lead to manage new and existing security tools and solutions
Work with Security Operations Lead and Cloud Operations teams to ensure all cloud endpoints and networks are properly secured and monitored
Work with Security Operations Lead and the IT team to ensure all user endpoints and identities are properly secured and monitored
Requirements
Security Professional with at least 3 years of hands-on technical experience
Strong understanding of Microsoft Sentinel
Background in working with the Microsoft Defender suite of products
Experience helping secure cloud endpoints; specifically, those running in Azure, AWS, and GCP – ideally with Cloud Native Application Protection Platforms such as Wiz
Understanding of identity access management and MFA
General understanding of industry standards, compliance, and legal guidelines such as NIST CSF, NERC CIP, GDPR
Strong understanding of attacker tactics, techniques, and procedures (MITRE ATT&CK)
Background in system administration
Ability to communicate complex security principles across teams and communicate directly with executives when needed
Lead Security Monitoring and Response Analyst at Mastercard coordinating enterprise crisis response and ensuring organizational resilience. Managing multi - region incident response and critical operations continuity.
IT - Security & Resilience Chief Engineer focusing on Security Monitoring for LBBW. Leading IT - Security projects and ensuring compliance and operational security within IT.
Director leading security operations and enhancing vulnerability management at IDEXX. Driving strategic execution and operational excellence across key domains in cybersecurity.
IT Security Operations Specialist ensuring security of global networks, systems, and data. Implementing security controls and performing advanced threat hunting using Microsoft Sentinel and Darktrace.
Staff SOC Analyst driving advanced threat detection and incident response for Sunrun's security team. Leading complex investigations, mentoring analysts, and improving detection capabilities in a remote setup.
GSOC Analyst focusing on critical events and risk management operations at Netflix. Monitoring global threats and coordinating incident management efforts in a hybrid work setting.
GSOC Analyst monitoring global events and managing critical incidents for Netflix's security operations. Ensuring timely communication and assessment during major security threats.
Security Operations Center Engineer enhancing security posture via automation and threat hunting. Requires strong experience with SIEM and SOAR platforms and Python scripting.
Security Operations Vulnerability Analyst II identifying and mitigating security vulnerabilities. Collaborating with teams to ensure timely risk remediation and protection of enterprise systems.
Cyber Defender (SOC Analyst) acts as the key point of contact for major security incidents. Coordinating response efforts and enhancing procedures at a leading AI - powered security partner.