4+ years in SOC operations, cybersecurity, or incident response. Strong knowledge of EDR, SIEM, SOAR, NDR, FIM, and Antivirus/NGAV platforms. Experience in writing playbooks, automating responses, and tuning detection logic. Familiarity with incident handling frameworks, threat hunting, and digital forensics. Knowledge of MITRE ATT&CK, Cyber Kill Chain, NIST IR, ISO 27001. Experience creating and maintaining incident response playbooks and runbooks. Ability to perform threat hunting and deep-dive investigation using EDR, NDR, and SIEM telemetry. Knowledge of security automation, cloud-native security, and network forensics. Strong communication and documentation skills.