This senior technical role is responsible for supporting, maturing, and expanding our Security Operations Center (SOC) logging and monitoring functions. This is a collaborative role and requires an advanced interdisciplinary technical background with skillsets in systems and application administration, data engineering, security operations, and detection engineering.
What You’ll Do :
- Design, implement, and maintain the SIEM infrastructure
- Utilize your knowledge of cloud environments to implement and support multi-cloud infrastructure deployments
- Utilize data management platform and other tools to enable efficient routing, parsing, and filtering of data
- Apply data engineering concepts such as data warehousing, real-time data processing, and data normalization to enhance the overall data infrastructure
- Leverage SIEM and data management platforms to collect, analyze, and correlate logs
- Lead SIEM detection engineering function to develop and fine-tune correlation rules, alerts, and dashboards to detect and respond to threats
- Contribute to the expansion of data engineering practices, leveraging advanced analytics and machine learning for proactive threat detection
- Participate in the purple team life cycle, collaborating with offensive and defensive security team to continuously improve detection and response strategies
- Identify and implement opportunities for automation to support operational excellence with the SIEM and data management tooling
- Collaborate with cross-functional teams to identify and mitigate security risks and vulnerabilities
- Perform regular audits of security configurations, policies, and procedures to ensure compliance with industry standards and regulations
- Stay up to date on latest security trends, tools, and best practices to continually enhance our SIEM capabilities
- Provide guidance and support to security engineers
- May be required to perform duties outside of normal work hours based on business needs
What You’ll Bring :
Extensive experience with SIEM, data management platforms, particularly Splunk and Cribl, including deployment, configuration, optimization, administration, and functional use of the tooling (e.G., integration of log sources into SIEM, searching cloud archives with Cribl, etc.)Strong understanding of network protocols, firewalls, intrusion detection systems, endpoint security solutions, and major cloud environments such as Azure, AWS, and GCPDemonstrated ability to deploy, configure, and secure infrastructure in Azure, AWS, and GCPProficiency in scripting languages (e.G., Python, PowerShell, Bash) for automation and task simplification, experience with AWS Lambda and Azure Functions is a plusStrong understanding of security frameworks such as MITRE ATT&CKHands on experience developing, tuning, and deploying security detections in SIEMExcellent analytical skills to identify, analyze, and resolve complex engineering issuesKnowledge of security frameworks and standards (e.G., COBIT, NIST 800-53, ISO27001, SSAE16, SOC1, SOC2, etc.)Proficient in Microsoft Word, Excel, PowerPoint, Visio, with the ability to create clear and effective technical documentation and presentationsStrong verbal and written communication skills;strong presentation skills
Ability to manage multiple high-priority projects and tasks effectively, ensuring alignment with strategic security goalsAbility to work collaboratively in a team-oriented environment, leading by example and fostering a culture of collaboration and continuous improvementGenerally, requires a bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field., or equivalent work experienceA minimum of 10 years information security experience, with a strong focus on SIEM, data management, and security operationsRelevant certifications such as Splunk Certified Power User / Admin, Cribl Certified Admin, Security+, CEH, OSCP, CISSP, etc.