Staff Data Analyst, SOC/Support
HuntressFull Time
Expert & Leadership (9+ years)
Candidates should have at least 3 years of experience in a Security Operations Center (SOC) or similar cybersecurity role, with familiarity with SIEM, EDR, and SOAR tools. A strong technical background in cybersecurity, understanding of common attack vectors, threat actors, and incident response workflows, along with excellent analytical, problem-solving, and communication skills are required. Preferred qualifications include experience with threat hunting, scripting, and the MITRE ATT&CK framework.
The SOC Analyst will monitor and triage security alerts from SIEM, EDR, and SOAR platforms, investigate suspicious activity, and escalate incidents as needed. They will collaborate with engineers to refine detection logic, participate in threat hunting, and maintain documentation of incidents and response actions.
Develops AI and autonomous systems for defense
Shield AI specializes in creating artificial intelligence and autonomous systems specifically for the defense industry. The company develops AI-powered systems, including autonomous drones, that assist military operations, especially in environments where GPS and communication may not be available. This technology allows for safer and more efficient defense operations. Shield AI differentiates itself from competitors by focusing on advanced AI capabilities and securing significant contracts with government and military clients, such as the multi-billion dollar EWAAC contract. The company's goal is to enhance operational capabilities and safety in military contexts, ultimately aiming to protect lives through its innovative solutions.