Key Responsibilities:
• Coordinating and conducting event collection, log management, event management, compliance automation, and identity monitoring activities using (SIEM) platforms
• Integrate SIEM, threat intelligence, ticketing systems, and other security tools to create seamless, automated workflows
• Develop and maintain custom log sources, data connectors, and parsing rules to meet customer needs
• Create and optimize correlation rules, detection rules, and alerts for security events and incidents
• Design, implement, and manage automated response playbooks within the SOAR platform (e.g. Azure Logic Apps, Palo Alto Networks Cortex XSOAR, Splunk Phantom) to enhance security operations
• Provide regular reports on the status and effectiveness of SIEM and SOAR tools
• Assist in generating reports for compliance, audit, and executive leadership
Required Qualifications:
• Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent experience).
• 5 years of professional experience in Cybersecurity, with a focus on SIEM administration.
• Be a Subject Matter Expert (SME) for SIEM, Correlation, and Log Source Ingestion
• In-depth knowledge of SIEM architecture, data collection, event correlation, and alerting mechanisms
• Experience working with and deploying a variety of SIEM technologies (i.e. CrowdStrike, Splunk, IBM QRadar)
• Strong experience with SOAR platforms and automated workflows
• Familiarity with cloud security platforms (e.g., Azure, AWS, GCP) and their integration with SIEM and SOAR
• Create technical documentation detailing SIEM aspects of the engagement
• Recognize opportunities where automation can improve analyst alert handling
• Familiarity with reports on the status of the SIEM to include metrics on items such as number of logging sources - log collection rate, and other performance metrics
Bachelor's degree