Become a Cybersecurity Incident Response Advisor at Southern California Edison (SCE) and help strengthen our security posture to build a better tomorrow. In this role, you'll be responsible for developing, curating, and tuning detection capabilities within Microsoft Sentinel, Splunk, and other security toolsets to support cybersecurity operations. You will create and manage advanced security use cases, refine detection logic, and provide expert technical guidance to incident response teams. Additionally, you will play a critical role in CSOC triage and investigation efforts ensuring timely threat detection and response. You will collaborate with key stakeholders to enhance security monitoring, improve incident detection efforts, and maintain a high level of cybersecurity expertise. In this role, you will: Develop, curate, and tune detection rules, use cases, and alerts in Microsoft Sentinel, Splunk, and other security toolsets. This includes analyzing log data, creating custom queries, and refining alert thresholds to reduce false positives and improve detection accuracy. Support CSOC triage and investigations, correlating security logs, analyzing alerts, and escalating incidents as necessary. Provide deep technical guidance during security events, identifying root causes, refining detections based on emerging threats, and supporting post-incident analysis. Monitor and stay up to date with the latest cybersecurity threats, vulnerabilities, and detection technologies, incorporating this knowledge into improved detection strategies. Develop, document, and maintain SOPs and runbooks for detection use cases and security alert responses to ensure best practices and continuous improvement. As a Cybersecurity Incident Response Advisor, your work will help power our planet, reduce carbon emissions and create cleaner air for everyone. Are you ready to take on the challenge to help us build the future?