1,416 Soc Engineer jobs in the United States
SOC Engineer
Posted 9 days ago
Job Viewed
Job Description
About CyberArk :
CyberArk (NASDAQ: CYBR), is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity - human or machine - across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world's leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit our CyberArk blogs or follow us on X, LinkedIn or Facebook.
Job Description
Our Global Security Operations Center (SOC) plays a critical role in detecting, investigating, and responding to security incidents worldwide. We are looking for an experienced and passionate SOC Engineer to join our team and help drive the next generation of SOC operations, including the use of AI-driven detection and automation.
What You'll Do
- Lead and deliver complex projects in Splunk, including ongoing maintenance, optimization, and advanced dashboards.
- Develop and automate security processes with Python scripting and orchestration frameworks.
- Design, implement, and fine-tune detection engineering rules for advanced threat visibility.
- Integrate and leverage AI/ML-based technologies to improve detection accuracy, alert triage, and response.
- Investigate and respond to security alerts, driving resolution and escalation when required.
- Actively support and enhance incident response (IR) processes across global teams.
- Conduct cloud security investigations across AWS, Azure, and other environments.
- Operate and optimize EDR solutions including advanced query writing.
Qualifications
- 5+ years of experience in a SOC, MDR, or Managed EDR service OR security operations .
- Proven hands-on expertise with Splunk (or equivalent SIEM tools), including project leadership.
- Strong background in scripting and automation (Python required).
- Practical experience in incident response and detection engineering.
- Solid knowledge of cloud security investigations and monitoring.
- Hands-on experience with EDR platforms
- Exposure to AI/ML-based solutions for detection, monitoring, or SOC automation.
- Strong analytical skills, problem-solving mindset, and ability to succeed in a fast-paced environment.
- Independent, proactive, and collaborative professional with a passion for excellence.
Additional Information
CyberArk is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
We are unable to sponsor or take over sponsorship of employment Visa at this time.
The salary range for this position is $82,000 - $120,000/year, plus commissions or discretionary bonus, which will be based on the employee's performance. Base pay may also vary considerably depending on job-related knowledge, skills, and experience. The compensation package includes a wide range of medical, dental, vision, financial, and other benefits.
SOC Engineer

Posted 2 days ago
Job Viewed
Job Description
Pay Rate: $ /hr
**US Citizenship is required.**
**Candidate must possess an active Public Trust.**
This role focuses on engineering SOC data feed solutions, implementing SOAR capabilities, and ensuring feed health through cross-team collaboration. The ideal candidate will have strong cybersecurity expertise, including network security, SIEM, incident response, and threat detection.
They will also serve as the backup SOC Lead, overseeing operations, managing escalations, and providing updates to senior leadership during critical incidents when the primary lead is unavailable.
Job Responsibilities:
+ Microsoft Sentinel Engineering: Maintain and optimize a Microsoft Sentinel SIEM/SOAR solution in alignment with client requirements, industry best practices, and federal compliance mandates.
+ Data Integration: Configure and manage log/data feeds from diverse sources (e.g., Fluent Bit, Windows Events, M365, cloud services, endpoint/security platforms).
+ Parsing & Normalization: Develop and refine log parsing rules using Regex, DCRs, and custom transformations to ensure accurate and usable data in Sentinel.
+ SOAR Development: Engineer automation and orchestration solutions using Microsoft Logic Apps, Azure Functions, and PowerShell/Python scripts to improve SOC efficiency and incident response.
+ Threat Detection Engineering: Build, tune, and optimize analytic rules, UEBA, dashboards, and reports to improve detection and response coverage.
+ Collaboration: Partner with cross-functional teams (network, endpoint, cloud, IT ops) to integrate new data sources and deliver actionable SOC capabilities.
+ Documentation & Knowledge Transfer: Develop and maintain clear documentation of SOC architecture, log source onboarding, and automation playbooks; provide training for SOC analysts on new tools and processes.
+ Advisory & Improvement: Conduct gap analyses of existing SOC capabilities, recommend improvements, and contribute to SOC process maturity.
+ Incident Response Support: Provide Tier 3 support and assist with complex investigations when required.
Basic Hiring Criteria:
+ Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience).
+ 5+ years of progressive cybersecurity/SOC experience (engineering and operations).
+ 2-5 years of experience in network defense, SOC engineering, or cybersecurity operations.
+ Hands-on experience with Microsoft Sentinel, including log onboarding, rule development, and automation.
+ Proficiency with log parsing and normalization (Regex, Fluent Bit, DCRs, KQL).
+ Strong scripting skills in PowerShell and/or Python for automation and data handling.
+ Experience configuring and maintaining data feeds for SOC visibility (cloud, endpoint, network, and on-prem).
+ Familiarity with incident response concepts, threat detection engineering, and SOAR workflows.
+ Excellent written and verbal communication skills with the ability to work across technical and non-technical teams.
Desired Qualifications:
+ Knowledge of federal cybersecurity mandates (M-21-31, NIST Cybersecurity Framework, CISA Incident/Vulnerability Playbooks, BOD 22-01).
+ Experience with Microsoft Logic Apps, Azure Functions, or other SOAR development platforms.
+ Experience with UEBA configuration to enhance anomaly detection.
+ Background in AI/ML frameworks for cyber analytics.
+ Experience building SOC metrics, dashboards, and reporting for operational visibility.
+ Familiarity with M365, Azure security tools, ServiceNow workflows, and CISA CDM tools.
+ Relevant certifications such as CISSP, CISM, Microsoft Security Operations Analyst (SC-200), or Azure Security Engineer (AZ-500).
Benefits offered vary by contract. Depending on your temporary assignment, benefits may include direct deposit, free career counseling services, 401(k), select paid holidays, short-term disability insurance, skills training, employee referral bonus, and affordable medical coverage plan, and DailyPay (in some locations). For a full description of benefits available to you, be sure to talk with your recruiter.
Military connected talent encouraged to apply.
VEVRAA Federal Contractor / Request Priority Protected Veteran Referrals / Equal Opportunity Employer / Veterans / Disabled
To read our Candidate Privacy Information Statement, which explains how we will use your information, please visit Company will consider qualified applicants with arrest and conviction records in accordance with federal, state, and local laws and/or security clearance requirements, including, as applicable:
+ The California Fair Chance Act
+ Los Angeles City Fair Chance Ordinance
+ Los Angeles County Fair Chance Ordinance for Employers
+ San Francisco Fair Chance Ordinance
L3 SOC Engineer
Posted 10 days ago
Job Viewed
Job Description
We need hands-on experience , PERSON RESOLVING l2/3 tickets NOT guide and mentor.
SOC engineer
- Security incidents and occurrences are tracked, analysed, and reported.
- Provide security controls such as IDS/IPS, endpoint security, vulnerability management, and data loss prevention recommendations to the client's security team.
- With the support of the SOC manager, create new operational rules, processes, and procedures.
- As an initial point of contact for the SOC team, assist them.
- Assist with handing out work assignments to the team members.
- Handling escalated security incidents.
- Proficiency in SIEM platforms (e.g., Splunk, QRadar, ArcSight, Sentinel).
- Deep knowledge of security frameworks : MITRE Telecommunication&CK, NIST, CIS, etc.
- Certifications such as CISSP, GIAC (GCIA, GCIH, GCFA), OSCP, CEH, or similar are highly desirable.
Tier 2 SOC Engineer
Posted 9 days ago
Job Viewed
Job Description
We are seeking an experienced Tier 2 SOC Engineer to join our Security Operations Center team. The ideal candidate will provide advanced incident detection, analysis, and response, leveraging a broad set of security tools and platforms. You will play a key role in protecting the organization's information assets, supporting incident investigations, and mentoring Tier 1 analysts.
Key Responsibilities
- Monitor security alerts and events using SIEM and security monitoring tools.
- Analyze and triage escalated security incidents; conduct in-depth investigations.
- Respond to and contain security incidents, ensuring proper escalation when necessary.
- Perform root cause analysis and recommend mitigation strategies.
- Support threat hunting activities and proactive identification of risks.
- Develop and tune correlation rules, alerts, and dashboards.
- Document incidents, investigations, and recommendations in ticketing systems.
- Collaborate with IT, engineering, and business units to ensure security best practices.
- Mentor and assist Tier 1 analysts with complex investigations.
- Serve as a subject matter expert by investigating and presenting intelligence on the latest cyber threats, vulnerabilities, and industry best practices weekly or bi-weekly
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: and Requirements
- 5+ years experience in a Security Operations Center or similar security role.
- Strong analytical and problem-solving skills.
- Proactively identify tasks and take ownership to ensure their completion.
- Demonstrate initiative and the capability to work autonomously with minimal supervision.
- Experience with the following tools/platforms:
- Cloud Security: Wiz, Azure Defender for Cloud, AWS Security Hub, related cloud native security tools
- Vulnerability Management: Tenable
- SIEM & Monitoring: Splunk, Microsoft Sentinel, Amazon CloudWatch, AWS CloudTrail
- EDR & Threat Protection: Microsoft Defender for Cloud, Microsoft Defender for Endpoint, Cisco AMP
- Identity & Access: Microsoft Defender for Identity, Azure Active Directory
- Data Loss Prevention: Code42, O365 DLP
- Familiarity with Microsoft 365 security and Azure security controls.
- Experience with AWS Security tools and controls.
- Knowledge of TCP/IP, network protocols, and common attack vectors.
- Ability to interpret and analyze log data from various sources.
- Understanding of incident response methodologies and frameworks (e.g., NIST, SANS).
- Knowledge of vulnerability management processes and remediation.
- Excellent written and verbal communication skills.
- Ability to work in a fast-paced, 5x8 SOC environment - Experience with scripting (Python) for automation and investigation is a plus.
MXSIAM SOC Engineer (Unit 42)
Posted 6 days ago
Job Viewed
Job Description
Our Mission
At Palo Alto Networks® everything starts and ends with our mission:
Being the cybersecurity partner of choice, protecting our digital way of life.
Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we're looking for innovators who are as committed to shaping the future of cybersecurity as we are.
Who We Are
We take our mission of protecting the digital way of life seriously. We are relentless in protecting our customers and we believe that the unique ideas of every member of our team contributes to our collective success. Our values were crowdsourced by employees and are brought to life through each of us everyday - from disruptive innovation and collaboration, to execution. From showing up for each other with integrity to creating an environment where we all feel included.
As a member of our team, you will be shaping the future of cybersecurity. We work fast, value ongoing learning, and we respect each employee as a unique individual. Knowing we all have different needs, our development and personal wellbeing programs are designed to give you choice in how you are supported. This includes our FLEXBenefits wellbeing spending account with over 1,000 eligible items selected by employees, our mental and financial health resources, and our personalized learning opportunities - just to name a few!
Your Career
As a Unit 42 SOC Engineer at Palo Alto Networks (Unit 42) you will create custom detection rules with various security products and create playbooks (automations) for information security use cases.
Working closely with our Unit 42 customer base to achieve their goals of maintaining great security on top of their entire security stack with XSIAM & Unit 42.
Your Impact
-
Develop information security and incident response workflows, procedures and deploy them as Cortex XSIAM correlation rules & playbooks
-
Work with customers worldwide on specific security product use cases, API documentations, playbooks & response options
-
Work with customers to understand their specific workflows to help automate procedures & responses on a large scale.
-
Write custom detection rules on top of various security products in Cortex XSIAM
Your Experience
-
Hands-on experience with as many information security tools such as SIEMs, FWs, EDR, Sandboxes, Vulnerability Management, etc.
-
Incident response and malware analysis experience
-
Software development experience, preferably python.
-
Good understanding of SOC and information security management workflows in enterprise organizations
-
Great communication skills
-
Previous experience with Cortex XSOAR or other SOAR products preferred
-
Previous experience with Cortex XSIAM preferred
The Team
Unit 42 is the global threat intelligence team at Palo Alto Networks. We believe threat intelligence should be shared and available to all within the industry. We deliver high-quality, in-depth research on adversaries, malware families, and attack campaigns. Our analysts uncover and document adversary behaviors and then share playbooks that give insight into the various tools, techniques, and procedures threat actors execute to compromise organizations.
If you're looking for a career with access to the brightest minds in cybersecurity, you've found it. We have a hunger for researching, hunting out the world's newest threats and sharing them with our industry to make the digital world a safer place.
You will be part of a growing, passionate, and dynamic team with an opportunity to work on challenging and exciting projects - centered on what we believe is one of the most significant mission statements in the world. We also strive to be the most people-centric company ever! That means we're constantly working to make your experience amazing, and you are part of the team breaking boundaries of what the workplace can be!
Compensation Disclosure
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $ - $ /YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here ( .
Our Commitment
We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at .
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
All your information will be kept confidential according to EEO guidelines.
MXSIAM SOC Engineer Unit 42
Posted 10 days ago
Job Viewed
Job Description
Job Description
Your Career
As a Unit 42 SOC Engineer at Palo Alto Networks (Unit 42) you will create custom detection rules with various security products and create playbooks (automations) for information security use cases.
Working closely with our Unit 42 customer base to achieve their goals of maintaining great security on top of their entire security stack with XSIAM & Unit 42.
Your Impact
- Develop information security and incident response workflows, procedures and deploy them as Cortex XSIAM correlation rules & playbooks
- Work with customers worldwide on specific security product use cases, API documentations, playbooks & response options
- Work with customers to understand their specific workflows to help automate procedures & responses on a large scale.
- Write custom detection rules on top of various security products in Cortex XSIAM
Qualifications:
Qualifications
Your Experience
- Hands-on experience with as many information security tools such as SIEMs, FWs, EDR, Sandboxes, Vulnerability Management, etc.
- Incident response and malware analysis experience
- Software development experience, preferably python.
- Good understanding of SOC and information security management workflows in enterprise organizations
- Great communication skills
- Previous experience with Cortex XSOAR or other SOAR products preferred
- Previous experience with Cortex XSIAM preferred
Additional Information
The Team
Unit 42 is the global threat intelligence team at Palo Alto Networks. We believe threat intelligence should be shared and available to all within the industry. We deliver high-quality, in-depth research on adversaries, malware families, and attack campaigns. Our analysts uncover and document adversary behaviors and then share playbooks that give insight into the various tools, techniques, and procedures threat actors execute to compromise organizations.
If you’re looking for a career with access to the brightest minds in cybersecurity, you’ve found it. We have a hunger for researching, hunting out the world’s newest threats and sharing them with our industry to make the digital world a safer place.
You will be part of a growing, passionate, and dynamic team with an opportunity to work on challenging and exciting projects — centered on what we believe is one of the most significant mission statements in the world. We also strive to be the most people-centric company ever! That means we’re constantly working to make your experience amazing, and you are part of the team breaking boundaries of what the workplace can be!
Compensation Disclosure
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $ - $ /YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here.
Our Commitment
We’re problem solvers that take risks and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
All your information will be kept confidential according to EEO guidelines.
MXSIAM SOC Engineer (Unit 42)

Posted 2 days ago
Job Viewed
Job Description
At Palo Alto Networks® everything starts and ends with our mission:
Being the cybersecurity partner of choice, protecting our digital way of life.
Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we're looking for innovators who are as committed to shaping the future of cybersecurity as we are.
**Who We Are**
We take our mission of protecting the digital way of life seriously. We are relentless in protecting our customers and we believe that the unique ideas of every member of our team contributes to our collective success. Our values were crowdsourced by employees and are brought to life through each of us everyday - from disruptive innovation and collaboration, to execution. From showing up for each other with integrity to creating an environment where we all feel included.
As a member of our team, you will be shaping the future of cybersecurity. We work fast, value ongoing learning, and we respect each employee as a unique individual. Knowing we all have different needs, our development and personal wellbeing programs are designed to give you choice in how you are supported. This includes our FLEXBenefits wellbeing spending account with over 1,000 eligible items selected by employees, our mental and financial health resources, and our personalized learning opportunities - just to name a few!
**Your Career**
As a Unit 42 SOC Engineer at Palo Alto Networks (Unit 42) you will create custom detection rules with various security products and create playbooks (automations) for information security use cases.
Working closely with our Unit 42 customer base to achieve their goals of maintaining great security on top of their entire security stack with XSIAM & Unit 42.
**Your Impact**
+ Develop information security and incident response workflows, procedures and deploy them as Cortex XSIAM correlation rules & playbooks
+ Work with customers worldwide on specific security product use cases, API documentations, playbooks & response options
+ Work with customers to understand their specific workflows to help automate procedures & responses on a large scale.
+ Write custom detection rules on top of various security products in Cortex XSIAM
**Your Experience**
+ Hands-on experience with as many information security tools such as SIEMs, FWs, EDR, Sandboxes, Vulnerability Management, etc.
+ Incident response and malware analysis experience
+ Software development experience, preferably python.
+ Good understanding of SOC and information security management workflows in enterprise organizations
+ Great communication skills
+ Previous experience with Cortex XSOAR or other SOAR products preferred
+ Previous experience with Cortex XSIAM preferred
**The Team**
Unit 42 is the global threat intelligence team at Palo Alto Networks. We believe threat intelligence should be shared and available to all within the industry. We deliver high-quality, in-depth research on adversaries, malware families, and attack campaigns. Our analysts uncover and document adversary behaviors and then share playbooks that give insight into the various tools, techniques, and procedures threat actors execute to compromise organizations.
If you're looking for a career with access to the brightest minds in cybersecurity, you've found it. We have a hunger for researching, hunting out the world's newest threats and sharing them with our industry to make the digital world a safer place.
You will be part of a growing, passionate, and dynamic team with an opportunity to work on challenging and exciting projects - centered on what we believe is one of the most significant mission statements in the world. We also strive to be the most people-centric company ever! That means we're constantly working to make your experience amazing, and you are part of the team breaking boundaries of what the workplace can be!
**Compensation Disclosure**
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $ - $ /YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here ( .
**Our Commitment**
We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at .
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
All your information will be kept confidential according to EEO guidelines.
Be The First To Know
About the latest Soc engineer Jobs in United States !
Lead Security Operations Center (SOC) Engineer
Posted 3 days ago
Job Viewed
Job Description
Responsibilities:
- Lead the design, deployment, and management of Security Information and Event Management (SIEM) systems and other SOC tools.
- Develop, tune, and optimize security detection rules and alerts to minimize false positives and maximize threat detection efficacy.
- Automate security monitoring, analysis, and response workflows using scripting and orchestration tools.
- Oversee the monitoring of network traffic, system logs, and endpoint activity for potential security threats.
- Conduct advanced threat hunting activities to proactively identify sophisticated and unknown threats.
- Provide technical leadership and mentoring to SOC analysts and engineers.
- Develop and maintain incident response playbooks and procedures.
- Collaborate with incident response teams to ensure swift and effective resolution of security incidents.
- Manage the lifecycle of security tools, including evaluation, procurement, and integration.
- Stay current with the latest cyber threats, attack vectors, and security technologies.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 6 years of experience in Security Operations or a related cybersecurity role, with at least 2 years in a lead or senior engineer capacity.
- Proven experience designing, implementing, and managing SIEM solutions (e.g., Splunk, QRadar, ELK Stack).
- Strong understanding of network security principles, TCP/IP, and common attack techniques.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation.
- Experience with EDR solutions, IDS/IPS, firewalls, and other security technologies.
- Excellent analytical, problem-solving, and critical-thinking skills.
- Strong leadership, communication, and interpersonal skills.
- Relevant security certifications (e.g., CISSP, GIAC GCIH, GCIA) are highly desirable.
Senior Security Operations Center (SOC) Engineer
Posted 8 days ago
Job Viewed
Job Description
Responsibilities:
- Design, implement, and manage Security Information and Event Management (SIEM) systems and other SOC tools.
- Develop and tune detection rules, alerts, and correlation logic to identify security incidents.
- Automate security tasks and workflows using scripting and orchestration tools.
- Configure and maintain security monitoring solutions, including IDS/IPS, EDR, and network traffic analysis.
- Lead threat hunting initiatives to proactively identify and mitigate emerging threats.
- Provide technical guidance and mentorship to SOC analysts.
- Analyze security incidents, conduct forensic investigations, and recommend remediation actions.
- Collaborate with incident response teams to ensure timely and effective resolution of security events.
- Stay current with the latest cybersecurity threats, vulnerabilities, and technologies.
- Contribute to the continuous improvement of SOC processes, procedures, and capabilities.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field; relevant certifications are highly desirable.
- 7+ years of experience in cybersecurity, with a strong focus on SOC operations and security engineering.
- Expertise in SIEM platforms (e.g., Splunk, QRadar, LogRhythm) and security analytics.
- Proficiency in scripting languages such as Python, PowerShell, or Bash for automation.
- In-depth knowledge of network security principles, protocols, and threat vectors.
- Experience with EDR, threat intelligence platforms, and vulnerability management tools.
- Strong understanding of cloud security concepts and best practices (AWS, Azure, GCP).
- Excellent analytical, problem-solving, and diagnostic skills.
- Exceptional written and verbal communication skills, with the ability to document technical procedures and incident reports.
- Relevant certifications such as CISSP, GSEC, GCIA, or CEH are a strong plus.
Lead Security Operations Center (SOC) Engineer
Posted 8 days ago
Job Viewed