of EDR/XDR – including incident investigation at a priority 1 and 2 severity and general day-to-day usage alongside best-practice configurations for common toolsets. Preferred vendors: CrowdStrike, Microsoft, Palo Alto, SentinelOne. Good Knowledge of incident response, aligned to MITRE ATT&CK with a good knowledge of common tactics, tools and techniques attackers utilise in the wild. More ❯
grow in a dynamic, successful company. You will need: Excellent knowledge of SIEM tools e.g Microsoft Sentinel, Google Chronicle, or Elastic (preferable). Excellent knowledge of EDR tools e.g CrowdStrike, SentinelOne, Microsoft, Palo Alto (preferable). Strong knowledge of SOAR tools. Experience building and developing a SOC environment. Knowledge of automation and scripting. You will get: Flexible working pattern. More ❯
grow in a dynamic, successful company. You will need: Excellent knowledge of SIEM tools e.g Microsoft Sentinel, Google Chronicle, or Elastic (preferable). Excellent knowledge of EDR tools e.g CrowdStrike, SentinelOne, Microsoft, Palo Alto (preferable). Strong knowledge of SOAR tools. Experience building and developing a SOC environment. Knowledge of automation and scripting. You will get: Flexible working pattern. More ❯
All roles at JumpCloud are Remote unless otherwise specified in the Job Description. About JumpCloud JumpCloud’s mission is to Make Work Happen, providing simple, secure access to corporate technology resources from any device, or any location. The JumpCloud Directory More ❯
All roles at JumpCloud are Remote unless otherwise specified in the Job Description. About JumpCloud JumpCloud’s mission is to Make Work Happen, providing simple, secure access to corporate technology resources from any device, or any location. The JumpCloud Directory More ❯