Serve as a key escalation tier (level 2 analyst) for on-call incident response resources
Perform complexed investigations as a part of Edwards active security monitoring and threat hunting operations within SLAs
Drive and design response and remediation actions to protect against security threats in Edwards environments and products
Lead data ingestion efforts from identifying gaps, onboarding data sources, tuning and correlating them
Lead the design, testing and implementation of detection use cases to production
Help drive threat hunting program
Responsible for operations and maintenance of key cyber security capabilities and services in Detection Response area – SIEM (Google SecOps, Splunk, Qradar etc), Log Collectors (WEF, Cribl, NXLog etc)
Design automation workflows to streamline detection and response efforts
As needed, participate in CIRT team efforts
Provide coaching, mentoring, and knowledge transfer to other team members
Document and maintain incident response technical playbooks and incident timelines
Staying informed on the evolving cybersecurity threat landscape to drive innovative detections, threat hunts, and automations to drive Edwards’ security posture
Requirements
Bachelor's Degree in related field
At least 4 years of experience in Information Security SOC, CIRT or SIEM teams
Tech Stack
Cyber Security
Splunk
Benefits
competitive salaries
performance-based incentives
wide variety of benefits programs to address individual needs