Your new role
The ideal candidate is a hands-on security engineer with deep experience in threat intelligence, threat hunting, security incident response, and managing both internal analysts and third-party SOC providers. You will help mature and modernize our operational defenses, proactively monitor for threats, and lead rapid incident response efforts across the enterprise.
What you'll need to succeed
- 5+ years of experience in cybersecurity with at least 3 years in a SecOps function.
- Proven experience in threat hunting, threat intelligence integration, and incident response at scale.
- Hands-on expertise with modern SIEM (, Splunk, Sentinel), SOAR platforms, EDR tools (, CrowdStrike, SentinelOne), and threat intel feeds.
- Experience managing hybrid or outsourced SOC environments and performance SLAs.
- Solid understanding of cloud-native security (AWS, GCP, or Azure), particularly in media streaming or content distribution environments.
- Strong grasp of MITRE ATT&CK framework and experience building detection coverage around it.
- Excellent communication and leadership skills, with the ability to brief executives and collaborate cross-functionally.
- Familiarity with scripting (, Python, PowerShell) and use of modern search / query languages (, KQL, SPL).
- Proven experience in leading incident response, threat management, and crisis management.Preferably ‘Certified Information Systems Security Professional’ (CISSP), or ‘Certified Information Systems Auditor’ (CISA) or ‘Certified Information Security Manager’ (CISM) certifications.
- Any additional cloud or platform-specific security certifications (, AWS Certified Security – Specialty, Microsoft Certified : Azure Security Engineer, etc.) are a plus.