Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or a related technical field, or equivalent practical experience.
5 years of experience working as a SOC analyst, threat hunting, or a related role with Endpoint Detection and Response (EDR) and SIEM technologies.
4 years of experience in working as a Detection Engineer.
Experience with Regex and one or more detection engineering languages (e.g., SIGMA, SPL, KQL or XQL).
Experience in networking, cyber threats, Tactics, Techniques and Procedures (TTPs), and countermeasure development.
Ability to travel up to 30% of the time as required.
Preferred qualifications:
Certification in one or more of the following: CompTIA Security+, CompTIA Network+, ISC2 (CISSP), SANS-GIAC certification (GSEC, GCIH, GCED, GCFA, GCIA, GNFA, GPEN, GWAPT), CISCO (CCNA), EC-Council (CEH, LPT).
Knowledge of scripting languages (e.g., PowerShell and Python).
Knowledge of operating systems including Linux.
Knowledge of security controls for common platforms and devices, including Linux and network equipment.
Ability to collaborate with client stakeholders and other groups within the customer environment to drive resolution for security issues.