Bachelor’s degree in Computer Science, Information Security, or related field, or equivalent work experience. 4+ years of experience in a Security Operations Center (SOC) or similar security-focused role. Hands-on experience with security analytics, log management, threat hunting, and incident response. Interest in applying automation and/or artificial intelligence and machine learning techniques to cybersecurity tasks. Strong understanding of cybersecurity concepts and frameworks (e.g., NIST, Mitre, ISO, Killl Chain). Experience with tools for cybersecurity, such as intrusion detection systems (IDS) and SIEM tools. Proficiency in scripting languages (e.g., Python, PowerShell) for automation and integration. Knowledge of security technologies such as firewalls, endpoint protection, IDS/IPS, and threat intelligence platforms. Strong analytical and problem-solving skills. Excellent communication skills. Ability to work under pressure in a fast-paced, dynamic environment. Experience with security orchestration, automation, and response (SOAR) platforms is preferred. Exposure to cloud security platforms (e.g., AWS, Azure, Google Cloud) is preferred. Practical experience working with Google SecOps tools and Chronicle is a plus. Hands-on experience with the Microsoft security platform (Sentinel, Defender) is a plus.