Triage and investigate security alerts
Assist with threat hunts and incident response efforts
Follow and help improve triage and response playbooks
Collaborate with team members to analyze threats and document findings
Communicate with customers about incidents and findings
Support tuning and testing of detection signatures
Eagerness to learn and grow in the cybersecurity field
Strong analytical and problem-solving skills
Clear written and verbal communication
Ability to work well in a remote team environment
2-3 years experience in IT, security operations, or a similar technical role
Familiarity with log management, SIEM tools, or endpoint protection solutions
Willingness to be on-call (some nights, weekends, and holidays)
U.S. residency and legal work authorization
Hands-on experience in a SOC or MSP environment
Exposure to incident response processes or threat hunting
Familiarity with tools such as SOAR, Sigma, Sysmon, Thinkst Canary, or OpenSearch/Elastic
Knowledge of frameworks like NIST, HIPAA, or PCI-DSS
Experience working with email platforms like O365, Google Workspace, or Exchange