Description

Key Responsibilities:
•    Coordinating and conducting event collection, log management, event management, compliance automation, and identity monitoring activities using (SIEM) platforms
•    Integrate SIEM, threat intelligence, ticketing systems, and other security tools to create seamless, automated workflows
•    Develop and maintain custom log sources, data connectors, and parsing rules to meet customer needs
•    Create and optimize correlation rules, detection rules, and alerts for security events and incidents
•    Design, implement, and manage automated response playbooks within the SOAR platform (e.g. Azure Logic Apps, Palo Alto Networks Cortex XSOAR, Splunk Phantom) to enhance security operations
•    Provide regular reports on the status and effectiveness of SIEM and SOAR tools
•    Assist in generating reports for compliance, audit, and executive leadership

Required Qualifications:
•    Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent experience).
•    5 years of professional experience in Cybersecurity, with a focus on SIEM administration.
•    Be a Subject Matter Expert (SME) for SIEM, Correlation, and Log Source Ingestion
•    In-depth knowledge of SIEM architecture, data collection, event correlation, and alerting mechanisms
•    Experience working with and deploying a variety of SIEM technologies (i.e. CrowdStrike, Splunk, IBM QRadar)
•    Strong experience with SOAR platforms and automated workflows
•    Familiarity with cloud security platforms (e.g., Azure, AWS, GCP) and their integration with SIEM and SOAR
•    Create technical documentation detailing SIEM aspects of the engagement
•    Recognize opportunities where automation can improve analyst alert handling
•    Familiarity with reports on the status of the SIEM to include metrics on items such as number of logging sources - log collection rate, and other performance metrics

Education

Bachelor's degree