Lead and support internal incident management including triage, containment, remediation, and post-incident reviews
Act as the primary interface with our external MDR team for alerts, investigations, and incident handling
Onboard and integrate new log/data sources into security monitoring
Monitor vulnerabilities and support patch management coordination
Operate and maintain internal security applications such as endpoint detection, centralized monitoring (SIEM/SOAR), identity protection, access controls, and network security monitoring
Develop and automate operational processes, playbooks, and response workflows
Partner with IT, OT, and business teams to embed security into projects
Contribute to security architecture and operational improvements
Act as a security advocate to promote best practices and raise awareness across teams
Design practical security solutions that balance usability, compliance, and risk reduction
Requirements
Bachelor's degree in information security, computer science, or engineering
4+ years' experience working in a Security Operations, Security Engineering, or MDR environment
Strong understanding of incident response processes and investigation workflows
Knowledge of security frameworks and standards (ISO 27001, NIST, CIS, MITRE ATT&CK)
Relevant certifications are a plus (e.g., SC-200, AZ-500, Security+, GCIH)
Hands-on experience with Microsoft Sentinel, Microsoft Defender for Endpoint, Microsoft Entra ID, Zscaler, and cloud security monitoring (Azure preferred)