Previous EDR, MDR, XDR, security monitoring, or incident response experience. Strong oral and written communication skills. Hands-on experience with security monitoring using endpoint and network tools. Hands-on experience with deployment, tuning, and operation of security tools (e.g., CrowdStrike, SentinelOne). Hands-on experience with deployment, tuning, and operation of SIEM or similar aggregation/analysis tools. Hands-on experience with triage and analysis of potential indicators of compromise. Hands-on experience performing rapid response to contain/remediate malicious activity. Hands-on experience with development and analysis of cyber threat intelligence. Hands-on experience with investigations involving digital evidence. Hands-on experience with intrusion detection / cyber threat hunting. Hands-on experience with malware analysis. Previous hands-on experience in information technology operations (NOC, SOC, IR Team). Bachelor's degree or equivalent. Minimum of 2 years of experience in cybersecurity operations, incident response, or another security discipline. Willingness to travel as needed.