Search Jobvertise Jobs
Jobvertise

Remote SIEM Engineer
Location:
US-PA-Pittsburgh
Email this job to a friend

Report this Job

Report this job





Incorrect company
Incorrect location
Job is expired
Job may be a scam
Other







Apply Online
or email this job to apply later

We are hiring SIEM Engineer for one of our clients in Pittsburgh, PA(link removed)>

Job Description:

Describe the role and the key responsibilities in order of which they will be doing daily:

  • Provide architecture-level design and implementation support by building, operating, and developing or maintaining a Splunk log management, threat, and vulnerability management infrastructure using Security Information and Event Management (SIEM) tooling and best practices
  • Consultant on engagements focused on the assessment, architecture, and deployment of enterprise-scale Splunk security solutions, in tandem with our Technology teams (RTB/CTB) who are responsible for supporting the technology infrastructure.
  • Participate in updates to the Splunk instance and coordinate mandatory changes with Splunk Cloud
  • Provide overall engineering and administration support in a distributed clustered Splunk environment, soon to be cloud/hybrid environment, consisting of search heads, indexers, deployers, deployment servers, heavy and universal forwarders, spanning across security, performance, and operational roles.
  • Recognize and onboard new data sources into Splunk, analyzing the data for anomalies and trends, and building dashboards highlighting the key trends of the data
  • Work within a Linux environment, editing and maintaining Splunk configuration files and apps
  • Coordinate Splunk's overall health and the operation of the Splunk Cloud instance, manage Splunk's ingest volume and work across teams to add or remote log statements from the application
  • Build security dashboards and alerts and investigate alerts and anomalies and participate in incident response
  • Manage customer expectations, help onboard data into Splunk, support projects in multi-site or clustered Splunk installations, and assist with the development of advanced KPIs and metrics to meet the requirements of key stakeholders
  • Conduct research in areas driven by customer use cases and architect and support systems used to configure and deploy solutions
  • Develop sophisticated and maintainable code with focus on consistency and following the best practices.
  • Develop net-new services and integration points designed to run in multi-cloud, highly scalable environments
  • Create and maintain alert and signature development within Splunk Enterprise Security
  • Evaluating security use cases and maintain mapping to regulatory requirements and MITRE Frameworks
  • Coordinating with the security operation center to ensure they are helping to provide the right visibility

Must Have:

  • Work experience with Security Information and Event Management (SIEM) tools, specifically Splunk (preference) or Sentinel (3 to 5+ years' experience)
  • Working experience with other security technologies IPS/IDS, threat detection, extended detection, and response.

Are there any skills you are willing to flex on if a candidate does not, have it?

  • If candidate cannot demonstrate experience of using Splunk Ad hoc, Splunk Enterprise Security, and/or Sentinel, candidate will be disqualified

Tell me about some soft skills that would make a candidate successful in this role:

  • Analytical skills
  • Ability to process data and articulate it back
  • Articulate to technical and non-technical audiences
  • Verbal communication
  • Written communication

Does this position require any degrees or certifications for the candidate to be successful?

  • Technical degree in cybersecurity or data management - nice to have
  • Security plus certification - nice to have
  • CISSP certification - nice to have
  • Network plus certification - nice to have

How many years of overall experience are you looking for these candidates to have?

  • 5 to 10 years of experience within security and/or technology operations/support teams
  • 3 to 5 years of experience with SIEM tools: Splunk and/or Sentinel

Additional information:

  • Location: Hybrid 4 Days Onsite Pittsburgh or Cleveland or Birmingham
  • Duration: 6 months Contract

About Us:

We are specialized in recruiting and deliver the best professional talent of industry and we are committed to deliver best experience for our clients and job seekers. With over two decades of experience in the recruitment industry, we proudly help you to find the next job that matches your professional skills. Our team understands your needs or requirement before starting the recruitment, that enables to find the high quality of talent with high success rate of talent delivery, keeps us continue to be the best in the industry.

Biogensys

Apply Online
or email this job to apply later


 
Search millions of jobs

Jobseekers
Employers
Company

Jobs by Title | Resumes by Title | Top Job Searches
Privacy | Terms of Use


* Free services are subject to limitations