On a daily basis, you will:
- Lead the analysis of security alerts, logs, and telemetry from SIEM, EDR, network sensors, cloud platforms, and threat‑intelligence sources.
- Identify sophisticated attack patterns, anomalous behaviours, and indicators of compromise & continuously refine detection logic, correlation rules
- Alert thresholds to reduce noise and improve accuracy.
Required skills
- Cloud and onsite security tooling (must have)
- Qualys (must have)
- FortiSIEM (desired)
- Solarwinds Security Monitor (desired)
- IDS/IPS Experience (must have)
- Python / Powershell Experience (must have)
- MITRE ATT&CK Experience (must have)
- SOC Experience (must have)
