Apply📍 U.S.
🧭 Full-Time
💸 150000.0 - 200000.0 USD per year
🔍 Pentesting
- 3-5 years of experience in managing SIEM and Security Monitoring tools required.
- Hands on knowledge of Google SecOps SIEM/SOAR Tool or equivalent SIEM Tool experience.
- Experience with Jira / Confluence for Ticket automation and documentation or equivalent ticket system.
- Cloud Security knowledge and experience, GCP and Kubernetes preferred.
- MITRE Kill Chain framework and threat hunting experience.
- Demonstrated leadership abilities in driving operational excellence and best practices.
- Ability to adapt to a hyper-growth pace and manage priorities.
- Experience delivering technical information to a less-technical audience in an impactful way.
- Experience providing mentorship and support to teams outside of InfoSec.
- Lead initiatives for security operations center (SOC), security monitoring and threat detection.
- Manage incident response, threat hunting processes and workflows.
- Use security tools and technology to detect and eradicate threats.
- Drive continuous improvements for SOC and SOAR processes.
- Evaluate complex business and technical requirements, communicating inherent risk and solutions to technical and non-technical business owners.
LeadershipGCPKubernetesJiraDocumentationComplianceConfluence
Posted 13 days ago
Apply