#A5C4F0E5C7592ED3201194F4969E95E5-9b3048
res, queries, and analytics used to identify suspicious or malicious activity.
Help analyze threat intelligence, attacker behaviors, and common tactics and techniques using frameworks such as MITRE ATT&CK and the Cyber Kill Chain.
Contribute to the development and maintenance of incident response playbooks, runbooks, and standard operating procedures (SOPs).
Support automation and process improvement efforts that help streamline alert triage, investigation, and response activities.
Document investigations, findings, and response actions clearly and accurately.
Participate in on-call support and incident escalations as needed, with guidance from senior team members.
Continuously build technical knowledge and stay informed on emerging cyber threats and incident response best practices.
Basic Qualifications
Bachelor's Degree in Computer Science, Cybersecurity, Information Technology, or a STEM-related field, or equivalent knowledge or hands-on experience.
Foundational knowledge of cybersecurity concepts, incident response, or security operations.
Desired Characteristics
Strong interest in cybersecurity, incident response, and threat detection.
Willingness to learn and grow in a fast-paced security environment.
Team-oriented with a proactive mindset and strong attention to detail.
Good problem-solving and communication skills.
Familiarity with common cyber threat frameworks such as MITRE ATT&CK, Cyber Kill Chain, or Pyramid of Pain.
Exposure to detection or monitoring tools such as SIEM platforms (for example, Splunk) is a plus.
Exposure to security technologies such as endpoint detection tools, network monitoring tools, or cloud security platforms is a plus.
Basic understanding of detection rule writing or scripting is a plus.
Familiarity with cloud platforms such as AWS or Azure is a plus.
Internship, lab, academic, military, or professional experience in cybersecurity is a plus.
Additional Information
Relocation Assistance Provided: No