Description

Key Skills: Cybersecurity, Incident Response, SIEM, SOAR, MDR, Threat Hunting, Python, Bash, SQL, AWS, Azure, GCP, MITRE ATT&CK, Splunk, QRadar, CrowdStrike, Microsoft Defender, Palo Alto, Datadog.

Roles & Responsibilities:

  • Investigate security incidents related to network traffic, IAM violations, and unauthorized access.
  • Analyze security detection rules, alerts, and correlation logic to identify malicious activities.
  • Conduct threat hunting activities to proactively identify potential threats within the environment.
  • Participate in incident response efforts, including containment, eradication, and recovery.
  • Collaborate with the software development & SRE teams.
  • Onboard customers and guide them through integration with MDR platforms.
  • Ensure customer satisfaction and provide strategic security recommendations.
  • This is a fully onsite role that requires high availability and proactive engagement.
  • On-call/rotational work required.

Experience Requirement:

  • 3-8 years of experience in cybersecurity operations and advanced threat detection.
  • Experience with SIEM platforms, Security orchestration platforms (SOAR), or specialized MDR providers such as Splunk, QRadar, CrowdStrike Falcon, Datadog, SentinelOne, Microsoft Defender, Palo Alto Cortex XDR, Panther, etc.
  • Experience with threat hunting methodologies.
  • Experience with databases and SQL.
  • Scripting experience with Python and Bash.
  • Ability to work in a team and in a 24/7 environment.
  • Good written and verbal communication skills.
  • MITRE ATT&CK framework knowledge is a plus.
  • Cybersecurity certifications are a plus.

Education: Any Graduation

Education

Any Graduate