Monitor and analyze security alerts, perform incident triage and response, conduct log analysis, and identify anomalous activity. Develop detection use cases and response playbooks, and prepare incident reports.
Requirements
- Provide continuous 24x7 security monitoring and incident response support in a shift-based environment.
- Minimum 2+ years of experience in a Security Operations Center (SOC) or Incident Response role.
- Strong experience analyzing logs from firewalls, endpoints, email systems, cloud platforms, and identity providers.
- Experience investigating phishing, malware, insider threats, and web-based attacks.
- Experience working in enterprise environments with cloud-based infrastructure and SaaS applications.
- Hands-on experience with endpoint detection and response concepts.
- Understanding of identity and access management, MFA, and conditional access controls.
- Strong knowledge of networking fundamentals (TCP/IP, DNS, HTTP/S).
- Experience reviewing and correlating raw log data for threat detection.
- Familiarity with vulnerability management processes.
