Your Mission :
Join our cybersecurity team and help us defend against digital threats! You'll be the go-to expert for complex incidents, detection rules, automation, and more. Ready to make an impact?
Your Responsibilities Include :
- Be the escalation point for complex incidents
- Conduct RCA and recommend mitigation actions
- Develop detection rules using MITRE ATT&CK
- Automate responses with playbooks (e.g., Azure Sentinel)
- Implement and monitor IAM, EDR, DLP, and cloud protections
- Guide SOC tasks and ensure technical alignment
- Continuously improve incident response processes
- Perform vulnerability assessments and coordinate fixes
- Analyze logs and detect anomalies using KQL
- Support crisis management during critical incidents
- Write detailed technical reports
- Enhance SOC visibility through data integration
You Must Have :
Degree in Information Security or Cybersecurity4+ years in cybersecurity (2+ in incident / team management)Fluent in English (written & spoken)Experience with SIEM (Microsoft Sentinel, Splunk, QRadar)Experience with EDR (SentinelOne, CrowdStrike, Defender)Familiarity with Vulnerability Management tools (Rapid7, Tenable)Cloud security experience (especially Azure)Leadership and team management skillsStrong communication and documentation skillsCritical thinking and analytical mindsetNice to Have :
International experienceCertifications : Security+, SC-200, SC-100, AZ-500Ready to take your cybersecurity career to the next level?
Apply now :