Find The RightJob.
Perform in-depth investigation of escalated alerts (L2/L3 triage).
∙Analyze endpoint telemetry, network logs, and system artifacts.
∙Conduct malware analysis, log correlation, and threat pattern identification.
∙Create, tune, and optimize SIEM detection rules and dashboards.
∙Perform threat hunting exercises across environments using MITRE ATT&CK.
∙Develop and maintain incident response playbooks and standard operating procedures.
∙Collaborate with Threat Intel teams to integrate IOCs into SIEM/SOAR.
∙Provide mentorship and technical assistance to L1 analysts.
∙Participate in red team/blue team cyber defense exercises.
∙Produce detailed incident reports and post-incident reviews for management.
Preferred Certifications ∙CompTIA CySA+ (required) ∙EC-Council CSA (required) or any similar ∙EC-Council CEH (strongly preferred) ∙Any Reputable SIEM solution Administration certification
Job Type: Full-time
Education:
Experience:
Work Location: In person
Similar jobs
No similar jobs found
© 2026 Qureos. All rights reserved.