As a SIEM Engineer for Cortex XSIAM, you will be responsible for assisting with the log migration and detection strategy of our customers. You will work closely with the technical lead to ensure that all of the relevant log sources are onboarded and ingested into XSIAM in accordance with industry best practices and customer requirements. You will then work to determine a suitable detection strategy, helping to protect customers from threats, by designing and implementing correlation rules.
Responsibilities
- Act as key member of the XSIAM SME supporting the client’s security operations center (SOC) and work with technical lead to develop log ingestion.
- Contribute to detection strategy based on industry best practices.
- Detail step by step process to ingest high quality log sources.
- Perform log source monitoring and optimization.
- Create high quality correlation rules.
- Tune log sources and correlation rules.
- Be an SME for SIEM, Correlation and Log Source Ingestion.
- Recognize opportunities where automation can improve analyst alert handling.
- Collaborate with internal and external teams to ensure product adoption.
- Create technical documentation detailing SIEM aspects of the engagement.
- Travel to customer meetings and workshops as needed (10%).
Experience
6+ years of deploying and integrating SIEM to enterprise to large enterprise-level solutions.Coordinating and conducting event collection, log management, event management, compliance automation, and identity monitoring activities using SIEM platforms.Ability to create and develop correlation and detection rules within a SIEM to support alerting capabilities.Experience working with and deploying a variety of SIEM technologies (e.g., Splunk, IBM QRadar).Proven ability to offer suggestions on detection strategy based on customer requirements.Ability to understand logs, locate and understand 3rd party documentation where needed.Familiarity with reports on the status of the SIEM to include metrics on items such as number of logging sources, log collection rate, and other performance metrics.Knowledge of Security Analysis & Response a plus, including both endpoint, network & cloud-based environments.4 years experience with Security Operation Centers tooling and processes.Relevant Bachelor's degree or industry recognized qualifications (CISSP, GIAC, etc.).Strong communication (written and verbal) and presentation skills, both internally and externally.Fluent English is a requirement – any other language is a plus.Ability to read and understand technical design documentation.Ability to create technical design documentation.Seniority Level
Associate
Employment Type
Contract
Industries
Computer and Network Security; IT Services and IT Consulting
#J-18808-Ljbffr