3+ years of proven experience in SIEM and security operations (e.g., Splunk ES, Anvilogic, Palo Alto Cortex, CrowdStrike, MS Sentinel, Google Chronicle).
3+ years of experience with Splunk, certifications preferred
3+ Year experience with the detection and response-based security controls in at least one Public Cloud environment (e.g., AWS, GCP, Azure).
2+ years of experience with WIZ
Understanding of Threat Modeling and Detection Engineering best practices.
Proficient programming skills in languages such as Python, Java, or C++, with a solid understanding of data structures and algorithms.
Familiarity with threat intelligence feeds, cybersecurity frameworks, and incident response methodologies.
Strong leadership abilities, with experience in influencing technical teams and driving successful outcomes.
Excellent problem-solving skills, analytical mindset, and a proactive approach to addressing security challenges.
Experience with Infrastructure as Code (CDK, Cloud Formation, Terraform)
Experience with Git base source code Management.
Experience in Agile teams
Bachelor's or Master's degree in Computer Science, Information Security, or a related field or equivalent experience.