• Monitor and analyze data from security systems including open source and enterprise solutions.
• Effectively communicate identified threats and track remediations until completion.
• Participate in the investigation and technical analysis of security incidents and provide remediation guidance.
• Integrate threat intelligence feeds and use frameworks like MITRE ATT&CK to assess and defend against current adversary tactics.
• Contribute to automation initiatives to streamline threat detection, alerting, and response workflows.
• Support threat hunting and red team exercises.
• Document findings, techniques, and outcomes in knowledge bases and reports.
To ensure you’re set up for success, you will bring the following skillset & experience:• Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field—or equivalent hands-on experience.
• Foundational experience (e.g., 1–2 years) in cybersecurity operations, threat analysis, or incident response.
• Proficiency with at least one SIEM platform (e.g., Splunk, QRadar, Sentinel).
• Proficiency with enterprise solutions providing dark web monitoring, attack surface management, threat intelligence, and risk rating.
• Understanding of network protocols, operating systems, and cybersecurity fundamentals.
• Strong scripting or automation skills (e.g., Python, PowerShell, Bash)
• Excellent communication and documentation abilities.
• Familiarity with threat intelligence tools and frameworks (e.g., MISP, STIX/TAXII).
• Knowledge of cloud security practices (AWS, Azure, or GCP).
• Relevant certifications such as CompTIA Security+, CySA+, SC-200, or GIAC (GCIH, GCIA, GCTI).
• Curiosity for cybersecurity and continuous learning.