FREE ACCESS
5,000–10,000 jobs/day

See all jobs on JobTailor
Search thousands of fresh jobs every day.
Discover
- Fresh listings
- Fast filters
- No subscription required
Create a free account and start exploring right away.
Tech Stack
Tools & technologiesAWSAzureCloudGoogle Cloud PlatformPython
About the role
Key responsibilities & impact- Platform Engineering: Design, deploy, and maintain Cortex XSIAM detections, correlations, and analytics across endpoint, network, cloud, and identity data sources. Build and tune detection logic to reduce noise while improving true positive rates. Perform ongoing platform optimization, including ingest management, rule tuning, and performance improvements.
- Detection Engineering & Threat Hunting: Develop and maintain custom detections using XQL (Cortex Query Language). Conduct proactive threat hunting and investigations using XSIAM analytics and telemetry. Translate threat intelligence and adversary techniques into actionable detections aligned to MITRE ATT&CK.
- Automation & Response: Design and maintain automated response playbooks to accelerate incident containment and remediation. Integrate XSIAM with enterprise tooling (e.g., identity, EDR, ticketing, cloud, network security platforms). Support continuous improvement of MTTR through automation and orchestration.
- Operations & Collaboration: Partner with SOC analysts, incident responders, and engineering teams on investigations and response activities. Support post-go-live enhancements, backlog grooming, and technical debt reduction initiatives. Provide technical guidance and mentorship to engineers and analysts.
Requirements
What you’ll need- Minimum 5+ years of experience in Security Operations, Detection Engineering, or SIEM/SOAR engineering
- Hands-on experience with Palo Alto Networks Cortex XSIAM (or strong XDR/XSOAR experience with rapid XSIAM ramp-up)
- Strong working knowledge of SIEM/XDR concepts and log analytics, incident response and threat detection workflows, and automation and orchestration use cases
- Proficiency with XQL, KQL, SPL, or similar security query languages
- Experience integrating data from endpoint, network, cloud, and identity platforms
- Strong scripting experience (Python preferred)
- Experience operating security platforms at enterprise scale
- Preferred experience with endpoint security (Cortex XDR, Defender, CrowdStrike, etc.), cloud security telemetry (AWS, Azure, GCP), identity and access logs (AD, Azure AD, IAM)
- Familiarity with MITRE ATT&CK and threat intelligence frameworks
- Experience supporting a 24/7 SOC or global security operations team
- Bachelor’s degree in computer science, information assurance, MIS or equivalent industry experience.
- Palo Alto Networks Certified XSIAM Engineer or Analyst certification preferred.
- Additional industry certifications are a plus (i.e., CEH, CISM, etc.)
Benefits
Comp & perks- Health insurance
- Retirement plans
- Paid time off
- Flexible work arrangements
- Professional development opportunities
ATS Keywords
✓ Tailor your resumeApplicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
Cortex XSIAMXQLKQLSPLPythonSIEMXDRSOARlog analyticsautomation
Soft Skills
collaborationmentorshiptechnical guidanceinvestigationincident response
Certifications
Palo Alto Networks Certified XSIAM EngineerPalo Alto Networks Certified XSIAM AnalystCEHCISM
