Job Title: Information Security Engineer – Defense & Incident Response
Location: Chandler, AZ On-Site
Duration: 18 months (01/28/2026 – 27/07/2027)
Pay:$50-$60/Hr
Job Summary
We are seeking an Associate Security Engineer with 2–4 years of hands-on experience to support our cybersecurity operations. The ideal candidate will assist in monitoring, detecting, investigating, and responding to security events using SIEM, EDR, and case management platforms, with a strong focus on Splunk. This role is well-suited for a security professional looking to grow their technical and analytical skills in a collaborative environment.
Key Responsibilities
- Monitor and analyze security alerts and events using SIEM tools, primarily Splunk
- Perform initial triage, investigation, and escalation of security incidents through case management systems
- Utilize Endpoint Detection and Response (EDR) tools to identify, investigate, and remediate endpoint threats
- Create, update, and manage incident tickets, ensuring accurate documentation and timely resolution
- Assist with incident response activities, including containment, eradication, and recovery efforts
- Analyze logs and telemetry from endpoints, servers, and network devices to identify suspicious activity
- Support tuning and optimization of SIEM rules, alerts, and dashboards to reduce false positives
- Collaborate with senior security engineers, SOC analysts, and IT teams to resolve security issues
- Participate in continuous improvement of security processes, playbooks, and procedures
- Stay current on emerging threats, vulnerabilities, and security best practices
Required Qualifications
- 2–4 years of experience in information security, SOC operations, or a related role
- Hands-on experience with SIEM platforms, preferably Splunk
- Working knowledge of EDR solutions (e.g., CrowdStrike, Defender, Carbon Black, SentinelOne)
- Experience using case management or incident tracking systems
- Strong understanding of security concepts such as malware, phishing, endpoint threats, and log analysis
- Familiarity with Windows and/or Linux operating systems
- Ability to follow incident response procedures and document findings clearly
Preferred Qualifications
- Experience writing or tuning Splunk queries, dashboards, or alerts
- Exposure to basic incident response frameworks (e.g., NIST, MITRE ATT&CK)
- Scripting or automation experience (Python, PowerShell, or similar)
- Security certifications such as Security+, Splunk Core Certified User, or similar
Skills & Attributes
- Strong analytical and problem-solving skills
- Attention to detail and ability to manage multiple cases simultaneously
- Effective written and verbal communication skills
- Team-oriented mindset with a desire to learn and grow in cybersecurity
