Being the cybersecurity partner of choice, protecting our digital way of life.
Your Impact
- Monitor Customer Communications - actively monitor channels like emails, ticketing systems, and Slack to quickly identify and prioritize cybersecurity inquiries, ensuring prompt and attentive customer service
- Incident Investigation - provide initial support in incident investigations, working with customers to understand incidents fully and gather necessary data, while escalating complex cases as needed
- Documentation and Reporting - maintain detailed records of customer interactions and contribute to creating incident reports and knowledge base articles to support both customers and internal teams
- Collaborate Internally - work closely with internal teams like Threat Hunting, Threat Intelligence, and Research to provide holistic support to customers and improve Palo Alto Networks' offerings based on customer feedback
- Ongoing Learning - engage in continuous learning and training to enhance your cybersecurity and threat hunting skills, keeping abreast of new threats, technologies, and best practices to better support customers
*While this position does not involve shifts, occasional weekend on-call duty may be required
Your Experience
- 3+ years experience with multi tiered SOC/MDR/IR is a must
- Deep understanding of attack trends and threat detection services
- Strong customer-first orientation and ability to simplify technical concepts
- Exceptional communication skills, including excellent command of the English language, both written and verbal, to effectively communicate with clients
- Experienced with technologies such as EDR, SIEM, SOAR, NGFW
- Deep understanding of attack trends and threat detection services
- Familiarity with security best practices and common emerging security threats
Nice to have:
- Hands-On experience with Cortex XSOAR or Cortex XDR
All your information will be kept confidential according to EEO guidelines.