Description

Required Skills:

  • 3+ years of proven experience in SIEM and security operations (e.g., Splunk ES, Anvilogic, Palo Alto Cortex, CrowdStrike, MS Sentinel, Google Chronicle).
  • 3+ years of experience with Splunk, certifications preferred
  • 3+ Year experience with the detection and response-based security controls in at least one Public Cloud environment (e.g., AWS, GCP, Azure).
  • 2+ years of experience with WIZ
  • Understanding of Threat Modeling and Detection Engineering best practices.
  • Proficient programming skills in languages such as Python, Java, or C++, with a solid understanding of data structures and algorithms.
  • Familiarity with threat intelligence feeds, cybersecurity frameworks, and incident response methodologies.
  • Strong leadership abilities, with experience in influencing technical teams and driving successful outcomes.
  • Excellent problem-solving skills, analytical mindset, and a proactive approach to addressing security challenges.
  • Experience with Infrastructure as Code (CDK, Cloud Formation, Terraform)
  • Experience with Git base source code Management.
  • Experience in Agile teams
  • Bachelor's or Master's degree in Computer Science, Information Security, or a related field or equivalent experience.

Education

Any Graduate