What You Will Do :
- Triage alerts and investigates incidents across SIEM, EDR and network data sources.
- Perform forensic analysis, identify root causes and recommend containment and remediation steps.
- Proactively hunt for unknown threats using MITRE ATT&CK and threat intelligence feeds.
- Tune detection rules and provide feedback to improve automation and detection accuracy.
- Develop incident response playbooks and mentor junior analysts.
- Support vulnerability management and compliance activities (HIPAA, GDPR, etc.).
What makes you a great fit :
3-7 years SOC experience in L2 / L3 incident response and threat hunting.Hands-on with SIEM (e.g., Splunk, QRadar), EDR (e.g., CrowdStrike) and SOAR tools.Strong knowledge of OS, networking and log analysis; scripting skills (Python, PowerShell) preferred.Familiar with MITRE ATT&CK, cyber kill chain and IR frameworks.Excellent communication and collaboration skills; mentoring experience is a plus.Relevant degree or certifications preferred.Why join us :
Influence next-gen AI-driven security products.Grow into a SOC leadership role.Continuous learning in a fast-evolving threat landscape.(ref : hirist.tech)