24/7 monitoring and alert triage across SIEM/EDR/cloud security tooling; identify false positives vs. credible threats and set appropriate severity.
Initial investigation and enrichment: gather relevant logs/telemetry, add context, and document findings clearly in the case/ticketing system.
Escalation and coordination: escalate confirmed/suspected incidents quickly and cleanly to L2/IR with a complete handoff (timeline, scope, IOCs, actions taken).
Monitor SIEM dashboard and security tools to detect security incidents.
Analyze alerts to determine relevance and prioritize response efforts.
Conduct investigations by gathering context and relevant logs.
Sentinel Blue is a young company focused on bringing enterprise-class cybersecurity to small and medium-sized businesses. They are pushing the envelope of how things are done and constantly seeking innovative ways to meet that mission in a fast-paced, dynamic environment that values learning and challenges.
Provide security monitoring and incident response of cyber security events.
Monitor and analyze logs and alerts to identify actionable security incidents.
Provide proactive “threat hunting” to detect incidents.
SonicWall is a cybersecurity company with more than 30 years of expertise. They are recognized as a leading partner-first company, ensuring their partners and their customers are never alone in the fight against cybercrime.
Lead the identification, triage, and validation of security incidents, acting as the ultimate escalation point for the SOC.
Drive organizational incident readiness by designing and executing practical response exercises to ensure first responders are prepared at all levels.
Lead cross-functional Post-Incident Reviews to extract critical lessons; drive specific tooling and process enhancements that harden organizational defenses.
Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Founded in 2015 by former NSA cyber operators, Huntress protects all businesses with enterprise-grade, fully owned, and managed cybersecurity products. They protect 4M+ endpoints and 7M+ identities worldwide, elevating underresourced IT teams with protection that works as hard as they do.
Own and lead incident response process and actively investigate events.
Prioritize alerts based on risk and collaborate with stakeholders for remediation.
Design, implement, and maintain comprehensive security dashboards and generate periodic reports.
Deel is the all-in-one payroll and HR platform for global teams with a vision to unlock global opportunity for every person, team, and business. As one of the largest globally distributed companies, Deel's team of 7,000 spans more than 100 countries and speaks 74 languages.
Lead deep-dive investigations across SIEM/EDR, cloud, and network telemetry; build timelines and determine scope and impact.
Drive case direction by forming and testing hypotheses; identify containment and remediation actions with clear rationale.
Mentor and coach SOC Analysts; provide structured feedback on investigations, ticket quality, and incident handling.
Cyber Advisors (CA) is a rapidly growing Cybersecurity Consulting firm and MSP. They believe in inclusion and is dedicated to continued employee development, therefore CA wants candidates who focus on innovation and results.
Detect and respond to security threats across network, systems, and cloud environments.
Troubleshoot and resolve complex technical issues, performing root cause analysis.
Act as an escalation point for unresolved alerts/issues and mentor SNOC Engineer I team members.
DYOPATH is committed to providing excellent technology services. They value innovation, collaboration, and continuous skill-building in a supportive team environment.
Conducts threat monitoring and analysis using threat detection tools.
Builds and maintains security infrastructure and system performance.
Triages alerts from detection platforms, identifying false positives and escalating attacks.
Nuvalent is dedicated to creating selective medicines with expertise in chemistry, specifically designed to meet the needs of cancer patients. They are an early-stage company that brings together experienced scientists and industry veterans with a history in oncology drug development and company building.
Use all-source intelligence to monitor security incidents and trends.
Support the Client’s trust and safety function to monitor and respond to issues.
Escalate security incidents to client stakeholders, following efficient procedures.
Sibylline is a leading intelligence and strategic risk consultancy in the security sector. Since 2010 they have supported businesses, governments and NGOs through the provision of high-quality risk analysis, due diligence and consultancy services.
Detection, analysis and management of security incidents
Making and evaluating reports
Monitoring the customer’s environment
Deutsche Telekom IT Solutions, a subsidiary of the Deutsche Telekom Group, was Hungary’s most attractive employer in 2025, according to Randstad’s representative survey. They provide a wide portfolio of IT and telecommunications services with more than 5300 employees.
Perform host/network based forensic investigations to collect and preserve evidence related to incidents
Managing incoming queues of detection alerts, threat reports and security incidents
Prioritizing and triaging competing incidents to maintain Service Level Agreements (SLA)
Nielsen provides powerful insights that drive client decisions and deliver extraordinary results, enabling a better media future. They are a dynamic global workforce committed to capturing audience engagement with content, standing at the forefront of the media revolution.
Deliver exceptional support experiences through security expertise and empathetic communication.
Provide expert-level advisory services on complex security questions and product issues.
Drive Security Operations team efficiency through process creation, optimization, and innovative feature ideas.
Blumira is a security operations platform built for growing teams and partners supporting them. They integrate comprehensive visibility, tools, and expert guidance to give IT and security teams peace of mind. The team is passionate about putting resilience in reach for every organization and helping teams build their own expertise.
Design, implement, and maintain advanced detection rules across SIEM, EDR, and Cloud platforms.
Develop complex automated response playbooks for multi-stage incidents and integrate security tools via APIs.
Co-lead the organization's threat hunting program, defining strategy, methodology, and campaign planning.
AlphaSense is a market intelligence and search platform powered by AI, helping companies make informed decisions with insights from various content sources. With over 2,000 employees globally and offices in multiple countries, they serve over 6,000 enterprise customers, including a majority of the S&P 500.
Triage, investigate, respond to, and remediate intrusions daily.
Mentor junior team members, allowing them to grow individually and as a team.
Contribute regularly to external-facing Huntress content such as blogs, webinars, presentations, and speaking engagements.
Huntress is a fully remote, global team of passionate experts and ethical badasses on a mission to break down the barriers to cybersecurity. Founded in 2015 by former NSA cyber operators, Huntress protects all businesses with enterprise-grade, fully owned, and managed cybersecurity products. They protect 4M+ endpoints and 7M+ identities worldwide, elevating underresourced IT teams with protection that works as hard as they do.
Collaborating with Security Operations Center (SOC) team members to monitor, detect, and respond to cybersecurity threats in a timely manner.
Responding to cybersecurity incidents from identification through resolution.
Developing and maintaining up-to-date knowledge of the threat landscape, as well as advancements in cybersecurity technologies and methodologies.
Calendly's product helps connect millions of people. They are in the midst of exciting product growth and offer opportunities to learn and grow alongside top professionals.
Monitor DLP information security alerts through the use of available DLP tools to respond, triage, and escalate as needed.
Assist Global Legal and Human Resources in processing DLP Remediation requests which may include confirming that data is removed from unauthorized locations.
Analyze event/alert patterns to properly interpret and prioritize threats with available DLP tools and other data protection devices.
AbbVie discovers and delivers innovative medicines and solutions that solve serious health issues today and address the medical challenges of tomorrow. They strive to have a remarkable impact on people’s lives across several key therapeutic areas.