Key Skills: Cybersecurity, Incident Response, SIEM, SOAR, MDR, Threat Hunting, Python, Bash, SQL, AWS, Azure, GCP, MITRE ATT&CK, Splunk, QRadar, CrowdStrike, Microsoft Defender, Palo Alto, Datadog.
Roles & Responsibilities:
- Investigate security incidents related to network traffic, IAM violations, and unauthorized access.
- Analyze security detection rules, alerts, and correlation logic to identify malicious activities.
- Conduct threat hunting activities to proactively identify potential threats within the environment.
- Participate in incident response efforts, including containment, eradication, and recovery.
- Collaborate with the software development & SRE teams.
- Onboard customers and guide them through integration with MDR platforms.
- Ensure customer satisfaction and provide strategic security recommendations.
- This is a fully onsite role that requires high availability and proactive engagement.
- On-call/rotational work required.
Experience Requirement:
- 3-8 years of experience in cybersecurity operations and advanced threat detection.
- Experience with SIEM platforms, Security orchestration platforms (SOAR), or specialized MDR providers such as Splunk, QRadar, CrowdStrike Falcon, Datadog, SentinelOne, Microsoft Defender, Palo Alto Cortex XDR, Panther, etc.
- Experience with threat hunting methodologies.
- Experience with databases and SQL.
- Scripting experience with Python and Bash.
- Ability to work in a team and in a 24/7 environment.
- Good written and verbal communication skills.
- MITRE ATT&CK framework knowledge is a plus.
- Cybersecurity certifications are a plus.
Education: Any Graduation