5+ years of experience in Security Incident Response. Ability to communicate investigative findings and strategies to technical staff, executive leadership, and legal. Ability to build scripts or tools to support investigation processes, with proficiency in Python. Mentor and train security operation engineers on data collection, analysis, and reporting. Practical experience acting as a lead during security incident response. Understanding of analysis and forensics techniques on macOS, Windows, and Linux. Experience utilizing SIEM tools to perform log reviews. Experience in cloud architecture and security (AWS, GCP) and cloud-based services. Must reside in the Pacific Time Zone, or Mountain Time Zones.