5-7 years hands-on SOC or Incident Response experience. Strong understanding of attacker lifecycle, MITRE ATT&CK, and threat actor TTPs. Experience with EDR (CrowdStrike preferred), SIEM (Splunk preferred), and SOAR (Torq, XSOAR, or Phantom). Familiarity with AWS, Okta, and SaaS platforms. Proficiency in writing queries and automations using Python, SPL, or equivalent. Excellent analytical and investigative skills. Strong documentation and communication skills.