We're looking for a hands-on Security Operations/ Cyber Defense Analyst who can think critically, automate relentlessly, and own incidents end-to-end in a fast-paced, engineering-driven environment.
Requirements
- 3–5 years of hands-on SOC or Incident Response experience in a cloud-first or hybrid environment
- Strong understanding of attacker lifecycle, MITRE ATT&CK, and threat actor TTPs
- Experience with EDR (CrowdStrike preferred), SIEM (Splunk preferred), and SOAR (Torq, XSOAR, or Phantom)
- Familiarity with AWS, Okta, and SaaS platforms
- Proficiency in writing queries and automations using Python, SPL, or equivalent
Benefits
- Bonus
- Restricted stock units (RSUs)
- Benefits