Position Details
About this role
A cybersecurity role focused on developing and maintaining threat detection rules, analyzing security logs, and improving incident response within a Security Operations environment.
Key Responsibilities
- Design detection rules
- Develop and implement YARA-L rules
- Analyze security logs
- Identify malicious activity
- Improve security posture
Technical Overview
Involves threat detection rule development using YARA-L, log analysis, and security incident management within SecOps platforms.
Ideal Candidate
The ideal candidate is a mid-level cybersecurity professional with 3+ years experience in threat detection, familiar with YARA-L syntax, log analysis, and security operations. They should be proactive, analytical, and capable of developing detection rules to identify malicious activity.
Must-Have Skills
Nice-to-Have Skills
Tools & Platforms
Required Skills
Hard Skills
Soft Skills
Industry & Role
Keywords for Your Resume
Deal Breakers
Lack of experience with threat detection rules, No knowledge of YARA-L, Inability to analyze security logs
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile