. You will be responsible for detecting, analyzing, and responding to advanced threats using SIEM and EDR tools, while supporting incident response and proactive defense operations. This role is part of a
24/7 global cyber defense function
and requires strong technical, analytical, and communication skills.
Key Responsibilities:
Conduct
threat hunting
across endpoint and network data to identify anomalies, IOAs, and TTPs.
Develop and maintain
detection/prevention use cases
in SIEM (Splunk ES) and EDR (CrowdStrike).
Perform triage and technical analysis of alerts, determining scope and remediation actions.
Leverage threat intelligence feeds (OSINT and premium sources) to enrich investigations.
Provide clear reports and updates to stakeholders during incidents.
Mentor junior analysts in threat hunting and incident response practices.
Requirements (Must-Have):
Strong hands-on experience in
Threat Hunting and Threat Intelligence
(endpoint + network).
Proficient with
SIEM (Splunk ES)
and
EDR (CrowdStrike)
.
Strong understanding of attack lifecycle, common attack vectors, tools, and techniques.
Ability to analyze large data sets to detect anomalies, IOAs, and TTPs.
Excellent
report writing and communication skills
(English).
Basic understanding of Mandarin is preferred but not mandatory (to support stakeholders in the region).
Good to Have:
Experience with AI/ML in threat hunting.
Exposure to OT/ICS and Cloud security environments.
Experience with threat intelligence platforms and premium intel feeds.
* Relevant certifications (CISSP, GCIH, or similar).
Beware of fraud agents! do not pay money to get a job
MNCJobz.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.