Experience with threat intelligence platforms (MISP, ThreatConnect, Anomali) and frameworks (MITRE ATT&CK, Diamond Model)
Proficiency in Python, PowerShell, or similar languages for automation and analysis
Experience securing cloud infrastructure (AWS, Azure, GCP) and container environments
Experience with insider threat analysis tools and methodologies (Securonix, Exabeam, Splunk UBA, Microsoft Sentinel UEBA)
Background in behavioral analytics, user activity monitoring, and privileged access management
Experience conducting digital forensics investigations and incident response
Experience monitoring dark web marketplaces and conducting threat actor analysis
Benefits
Meaningful Collaborations - The successful candidate will work cross-functionally with other relevant teams to carry out implementations that will improve and create an impact on customer experience.
Scalable Growth - Be part of a fast-growing organization with the vision to expand its territories outside APAC which will provide opportunities for career advancement.
A Space For Bright Ideas - Let your bright ideas be converted into meaningful changes! Coins culture welcomes new ideas backed up by data to create an impact.
Staff SOC Analyst driving advanced threat detection and incident response for Sunrun's security team. Leading complex investigations, mentoring analysts, and improving detection capabilities in a remote setup.
GSOC Analyst focusing on critical events and risk management operations at Netflix. Monitoring global threats and coordinating incident management efforts in a hybrid work setting.
GSOC Analyst monitoring global events and managing critical incidents for Netflix's security operations. Ensuring timely communication and assessment during major security threats.
Security Operations Center Engineer enhancing security posture via automation and threat hunting. Requires strong experience with SIEM and SOAR platforms and Python scripting.
Security Operations Vulnerability Analyst II identifying and mitigating security vulnerabilities. Collaborating with teams to ensure timely risk remediation and protection of enterprise systems.
Cyber Defender (SOC Analyst) acts as the key point of contact for major security incidents. Coordinating response efforts and enhancing procedures at a leading AI - powered security partner.
Junior SOC Analyst at Core Specialty responsible for monitoring and triaging security alerts across IT environment. This role offers hands - on experience in cybersecurity with a fast - paced operational environment.
Security Operations Coordinator overseeing security strategies and managing operations for public safety in NSW. Collaborating with law enforcement and enhancing transport system resilience with flexible work options.
Intern role in Product Security Operations for Salesforce, leading innovative AI - driven security tools and initiatives. Collaborate with experts to enhance security governance and risk management processes.
Security Operations Manager leading colleague safety and security programs at CVS Health. Responsible for managing security risks and operational performance in retail environments.