FREE ACCESS
5,000–10,000 jobs/day

See all jobs on JobTailor
Search thousands of fresh jobs every day.
Discover
- Fresh listings
- Fast filters
- No subscription required
Create a free account and start exploring right away.
About the role
Key responsibilities & impact- Provide direct day-to-day management to an initial team of 5 security analysts.
- Oversee and continuously optimize end-to-end incident response workflows.
- Leverage specialized expertise to hunt for, detect, and neutralize sophisticated cyber threats across the enterprise environment.
- Monitor and maintain central network security defenses, including firewall management, configuration tracking, and rule optimization.
Requirements
What you’ll need- Minimum of 3+ years of professional leadership/management experience within a Security Operations Center (SOC) or Incident Response team.
- Specialized, hands-on experience in modern threat detection strategies, malware analysis, and adversarial tactics.
- Proven proficiency with Enterprise Endpoint Detection and Response (EDR) platforms (e.g., CrowdStrike, Defender for Endpoint, SentinelOne) to hunt and isolate endpoint threats.
- Deep understanding of Security Information and Event Management (SIEM) architectures for log analysis, correlation rule building, and alert optimization.
- Practical experience managing network architecture security defenses, with specific hands-on capabilities in firewall management and network protocols.
Benefits
Comp & perks- Flexible work arrangements
- Professional development
ATS Keywords
✓ Tailor your resumeApplicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
incident responsethreat detectionmalware analysisadversarial tacticsfirewall managementnetwork protocolslog analysiscorrelation rule buildingalert optimizationendpoint threat isolation
Soft Skills
leadershipmanagementteam managementoptimizationcommunication
