Key Responsibilities:
Build, tune, and migrate SIEM detection rules using threat intel & MITRE ATT&CK.
Create SOAR playbooks for automated response, enrichment, and threat hunting.
Implement log ingestion pipelines, custom parsers, and data enrichment workflows.
Integrate APIs and document SecOps content clearly and efficiently.
Skills Required:
Hands-on with SecOps/Chronicle.
Detection engineering + SIEM/SOAR automation experience.
API integration, scripting (Python), YAML/JSON.
Strong understanding of threat intel, IOCs, log data, and security workflows.
Any question or remark? just write us a message
If you would like to discuss anything related to payment, account, licensing,
partnerships, or have pre-sales questions, you’re at the right place.