/BA degree in Cyber Security/Computer Science or equivalent combination of related work experience desired. Must have a good Linux background, ideally Linux Sys Admin CISSP, CISM, GCIA, GCIH, GCFE, GCFA, GREM, Splunk Power User and/or similar certifications is preferred. Verifiable experience in Security Operations and Incident Response. Experience in performing analysis with SIEM technologies such More ❯
practices. Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel), vulnerability scanners (e.g., Nessus, Qualys), and other security platforms. Relevant certifications such as CISSP, CISM, CEH, GIAC, or GCIA are highly desirable. Excellent problem-solving, communication, and team leadership skills. Ability to work under pressure and manage multiple priorities effectively. Preferred Skills: Experience in regulated industries (e.g., finance, healthcare More ❯
KQL queries, analytic rules, data connectors, workbooks, etc. Proficiency with LogRhythm SIEM : AI Engine rules, SmartResponse, log source integration. Certifications such as Microsoft SC-200 , LogRhythm Certified Professional , CEH , GCIA , or CISSP are a plus. More ❯