Information Security Engineer – Defense & Incident Response

Job Title: Information Security Engineer – Defense & Incident Response
Location: Chandler, AZ On-Site
Duration: 18 months (01/28/2026 – 27/07/2027)
Pay:$50-$60/Hr

Job Summary

We are seeking an Associate Security Engineer with 2–4 years of hands-on experience to support our cybersecurity operations. The ideal candidate will assist in monitoring, detecting, investigating, and responding to security events using SIEM, EDR, and case management platforms, with a strong focus on Splunk. This role is well-suited for a security professional looking to grow their technical and analytical skills in a collaborative environment.

Key Responsibilities

  • Monitor and analyze security alerts and events using SIEM tools, primarily Splunk
  • Perform initial triage, investigation, and escalation of security incidents through case management systems
  • Utilize Endpoint Detection and Response (EDR) tools to identify, investigate, and remediate endpoint threats
  • Create, update, and manage incident tickets, ensuring accurate documentation and timely resolution
  • Assist with incident response activities, including containment, eradication, and recovery efforts
  • Analyze logs and telemetry from endpoints, servers, and network devices to identify suspicious activity
  • Support tuning and optimization of SIEM rules, alerts, and dashboards to reduce false positives
  • Collaborate with senior security engineers, SOC analysts, and IT teams to resolve security issues
  • Participate in continuous improvement of security processes, playbooks, and procedures
  • Stay current on emerging threats, vulnerabilities, and security best practices


Required Qualifications

  • 2–4 years of experience in information security, SOC operations, or a related role
  • Hands-on experience with SIEM platforms, preferably Splunk
  • Working knowledge of EDR solutions (e.g., CrowdStrike, Defender, Carbon Black, SentinelOne)
  • Experience using case management or incident tracking systems
  • Strong understanding of security concepts such as malware, phishing, endpoint threats, and log analysis
  • Familiarity with Windows and/or Linux operating systems
  • Ability to follow incident response procedures and document findings clearly


Preferred Qualifications

  • Experience writing or tuning Splunk queries, dashboards, or alerts
  • Exposure to basic incident response frameworks (e.g., NIST, MITRE ATT&CK)
  • Scripting or automation experience (Python, PowerShell, or similar)
  • Security certifications such as Security+, Splunk Core Certified User, or similar


Skills & Attributes

  • Strong analytical and problem-solving skills
  • Attention to detail and ability to manage multiple cases simultaneously
  • Effective written and verbal communication skills
  • Team-oriented mindset with a desire to learn and grow in cybersecurity

 

Reference JOB-244607

Company Strategic Staffing Solutions

Job type Contract

Apply now

"*" indicates required fields

Accepted file types: doc, docx, pdf, txt, Max. file size: 3 MB.