Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or equivalent practical experience. 5–8+ years of experience in SOC operations, cyber defense, threat hunting, or incident response roles. Strong hands-on expertise with SIEM (Splunk, Sentinel), EDR (CrowdStrike, Microsoft Defender), IDS/IPS, Firewalls, and cloud security monitoring (Azure/AWS). Deep knowledge of Windows, Linux, and cloud audit logs, authentication flows, and security telemetry. Proven experience investigating high-severity incidents, malware behavior, lateral movement, privilege misuse, and network-based threats. Strong understanding of MITRE ATT&CK, cyber kill chain, threat intelligence lifecycle, and adversary detection techniques. Experience writing detection rules, triage workflows, and automated SOAR playbooks. Strong analytical, investigative, and communication skills.