Expert IT Cyber Defense Analyst responsible for advanced threat detection, security monitoring, incident investigation, and response across enterprise environments.
Requirements
- Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or equivalent practical experience.
- 5–8+ years of experience in SOC operations, cyber defense, threat hunting, or incident response roles.
- Strong hands-on expertise with SIEM (Splunk, Sentinel), EDR (CrowdStrike, Microsoft Defender), IDS/IPS, Firewalls, and cloud security monitoring (Azure/AWS).
- Deep knowledge of Windows, Linux, and cloud audit logs, authentication flows, and security telemetry.
- Proven experience investigating high-severity incidents, malware behavior, lateral movement, privilege misuse, and network-based threats.
- Strong understanding of MITRE ATT&CK, cyber kill chain, threat intelligence lifecycle, and adversary detection techniques.
- Experience writing detection rules, triage workflows, and automated SOAR playbooks.
- Strong analytical, investigative, and communication skills.
Benefits
- Quarterly Company-Wide Recharge Days
- Flexible Work Environment (Remote)
- Peer-based incentive “Cheer” awards
- “All in to Win” bonus Program
- Tuition Reimbursement Program
