
Threat Detection and Response Analyst
Kimberly-Clark
full-time
Posted on:
Location Type: Hybrid
Location: Prindisa • Costa Rica
Visit company websiteExplore more
Tech Stack
About the role
- Monitor and analyze security events across network, endpoint, and cloud environments
- Lead advanced incident investigations, including root cause analysis and remediation coordination on prem and cloud
- Help with Develop and tuning detection logic, SIEM rules, and automated response workflows
- Perform proactive threat hunting and integrate threat intelligence into detection pipelines
- Deliver incident reports, trend analysis, and performance metrics to stakeholders
- Continuously improve detection processes, tools, and coverage to address evolving threats
- Collaborate with global SOC\IR teams and cross-functional partners to maintain security resilience
Requirements
- Bachelor’s degree in computer science, Cybersecurity, or related field
- 5+ years of experience in SOC operations, incident response, or threat detection
- Expertise with SIEM platforms (e.g., Splunk, Sentinel), EDR tools, and IDS/IPS technologies
- Strong knowledge of adversary tactics and frameworks (e.g., MITRE ATT&CK)
- Strong Knowledge of cloud infra and security tools design
- Proficiency in scripting or automation (Python, PowerShell, Bash)
- Familiarity with NIST frameworks and compliance standards
- Good experience in OT is desired
- Proficient in English (written and verbal)
Benefits
- flexible work arrangements that empower you to have purposeful time in the office and partner with your leader to make flexibility work for both you and the business
- career development
- commitment to sustainability and inclusion
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
SIEMEDR toolsIDSIPSscriptingautomationPythonPowerShellBashcloud security
Soft Skills
communicationcollaborationanalytical thinkingproblem-solvingreporting