Find The RightJob.
Job Details :
Description : We're looking for an Incident Response (IR) specialist with deep expertise in logging, telemetry, and SIEM engineering who can detect, investigate, and eradicate threats across cloud and endpoint environments. You will own end-to-end detection engineering and response workflows - building high-fidelity detections, orchestrating data flows, tuning SIEM pipelines, leading incident investigations, and strengthening controls across AWS, Google Cloud Platform, and endpoint security platforms.
Key Responsibilities :
Required Qualifications : Experience: 3 7+ years in Incident Response, SOC, or Threat Detection/Response with hands-on SIEM engineering. Cloud: Practical security operations in AWS and Google Cloud Platform (logging coverage, detections, IAM, network controls, data protection). Malware Analysis: Proficiency with both static (e.g., strings, disassembly triage) and dynamic (sandboxing/behavioral) techniques. Networking & Data Flows: Strong grasp of TCP/IP, DNS, HTTP(S), proxying, TLS, common lateral movement patterns; able to diagram and optimize telemetry flows. SIEM: Engineering and operating at least one enterprise SIEM (e.g., Splunk, Elastic, Microsoft Sentinel, Chronicle) with query/correlation rule creation. Endpoint Protection: Experience with EPP/EDR tools (e.g., CrowdStrike, Microsoft Defender for Endpoint, SentinelOne, Carbon Black) and response workflows. Incident Handling: Proven ability to lead incidents, communicate clearly under pressure, and produce executive-ready reports. Scripting: Proficiency in at least one: Python, PowerShell, or Bash for automation and enrichment. Information Security Principles: Demonstrated application of CIA triad, zero trust concepts, hardening, and secure operations practices.
Preferred Qualifications : Certifications: GCIH, GCIA, GCFA, GNFA, GCTI, GMON, OSCP, AWS Security Specialty, Google Professional Cloud Security Engineer, CISSP. Forensics: Memory/disk triage (Volatility, KAPE), PCAP analysis (Wireshark), YARA/Sigma rule authoring. Threat Intel & CTI: Consuming and operationalizing TI (MISP, TAXII/STIX), enriching detections with context. Automation: SOAR playbook design (e.g., Cortex XSOAR, Swimlane, Splunk SOAR, Sentinel automation). Data Engineering: Familiarity with schema mapping (ECS/OCSF), parsing (Grok/regex), and streaming (Kafka/Kinesis/Pub/Sub).
For applications and inquiries, contact: hirings@openkyber.com
Similar jobs
INNOVIM DEFENSE SERVICES, LLC
Colorado Springs, United States
3 days ago
Amazon Web Services
Seattle, United States
3 days ago
General Dynamics Information Technology
Tampa, United States
3 days ago
State of Iowa
Des Moines, United States
3 days ago
Amazon Web Services
New York, United States
3 days ago
Amazon.com
Seattle, United States
3 days ago
Kforce Inc
Huntsville, United States
3 days ago
© 2026 Qureos. All rights reserved.