Position Details
About this role
This role involves monitoring security events, supporting incident response, and maintaining compliance within a highly regulated environment. The analyst will work with SIEM and EDR tools to detect and respond to security threats.
Key Responsibilities
- Monitor security events using SIEM and EDR platforms
- Assist with configuration and tuning of SIEM and EDR tools
- Participate in on-call rotation for security support
- Conduct phishing simulations and analyze incidents
- Support threat modeling and compliance activities
Technical Overview
The position requires experience with SIEM platforms like QRadar and Splunk, EDR solutions, threat intelligence, and security controls such as firewalls and encryption. Knowledge of cloud platforms like AWS and GCP is preferred.
Ideal Candidate
The ideal candidate is a mid-level cybersecurity professional with 2+ years experience in security operations, SOC analysis, and familiarity with SIEM and EDR tools. They should be analytical, detail-oriented, and capable of supporting incident response and threat management in a highly regulated environment.
Must-Have Skills
Nice-to-Have Skills
Tools & Platforms
Required Skills
Hard Skills
Soft Skills
Industry & Role
Keywords for Your Resume
Deal Breakers
Lack of experience with SIEM or EDR tools, No security-related degree, No experience in security operations, Unwillingness to work remotely
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile