Are you tired of working in a small cyber team and feeling stretched too thin? Do you want to be part of something bigger, where you can use your skills to make a real impact?
This role is not just about watching alerts and escalating them. You'll be responsible for detection engineering, digging through logs, and building ways to automate threat detection. You'll work with a variety of tools, including Darktrace, Splunk, Proofpoint, and CrowdStrike, and get hands-on experience with them.
If threat hunting is what gets you excited, you'll turn intel into real-world detection strategies, spot attacker behaviors before they become incidents, and be part of the end-to-end response. You'll also have the opportunity to work on internal exploitation, attacking our systems to find vulnerabilities and making sure they're fixed properly.
Plus, if you enjoy taking on side projects, improving security processes, contributing to Incident Response Plans, and actually making a difference instead of firefighting all day. We're looking for someone who is a couple of years into SOC-type roles and has had experience being part of incidents.
Key Responsibilities:
* Detection Engineering: Build ways to automate threat detection using various tools
* Threat Hunting: Turn intel into real-world detection strategies and spot attacker behaviors before they become incidents
* Internal Exploitation: Attack our systems to find vulnerabilities and ensure they're fixed properly
Requirements:
* Experience in SOC-type roles for at least 2 years
* Experience being part of incidents
* Knowledge of detection engineering, threat hunting, and internal exploitation