Position Details
About this role
Seeking an experienced cybersecurity analyst to lead SOC operations, incident response, and threat hunting activities in a security-focused environment.
Key Responsibilities
- Lead incident response activities
- Develop and maintain incident response playbooks
- Perform threat hunting using SIEM and EDR tools
- Conduct digital forensics and malware analysis
- Collaborate with IT and legal teams
Technical Overview
Role involves managing SIEM tools like Splunk and QRadar, conducting digital forensics, malware analysis, and utilizing cybersecurity frameworks such as NIST and MITRE ATT&CK.
Ideal Candidate
The ideal candidate is a highly experienced cybersecurity professional with at least 10 years in SOC operations and incident response, possessing deep knowledge of security tools and frameworks, capable of leading incident management in a 24x7 environment.
Must-Have Skills
Nice-to-Have Skills
Tools & Platforms
Required Skills
Hard Skills
Soft Skills
Certifications
Required
Preferred
Industry & Role
Keywords for Your Resume
Deal Breakers
Less than 10 years of cybersecurity experience, Lack of incident response or SOC experience, No familiarity with SIEM or EDR tools, No security clearance
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile