Detalhes do emprego
This is a 1-Year Contract role (Renewable, Subject to Approval) Primarily accountable for overseeing the engineering, development and maintenance / continuous improvement of threat detection use-cases scenarios within the SIEM (Splunk ES). Additionally, involved in the engineering and development of custom rules in the EDR (CrowdStrike) to swiftly detect potential threat attacks. Another responsibility involves creating transparency of existing detection capabilities by mapping them to the MITRE ATT&CK framework. Responsibilities Support in planning and executing regional IT Infrastructure strategy aligned with company strategy. Proactively create, test and tune new detection use-cases in the SIEM and custom rules in the EDR. Review and enhance existing detection use-cases using e.g., Machine Learning or User & Entity Behavior Analytics (UEBA). Map the detection use-cases to the MITRE ATT&CK framework to determine the SIEM monitoring coverage. Perform regular updates to threat detection engineering playbooks, processes, and documentation. Work closely with the SOC to challenge detection and prevention capabilities. Identify and implement SIEM use-cases that address blind spots. Coordinate with log onboarding team and SIEM architect to validate new log-sources onboarded for compliance and improve performance on SIEM backend. Collaborate with Service Operations team to address challenges, process fulfillment, documentation, and improvement of Service Operations Quality. Provide governance on topics related to operational stability. Qualifications Specific Knowledge Intense knowledge in using Splunk Enterprise Security (ES). Intense knowledge in developing and tuning detection use-cases (Correlation Searches) in Splunk based on Data Models. Experience in Machine Learning and Risk Based Monitoring in Splunk is an advantage. Ability to analyze and interpret security logs and events to identify potential threats and attack patterns. Experience in validating data source compliance using the common interface model (CIM). Experience in setting up and utilizing data models in Splunk. Deep understanding of cyber security concepts to create detection use-cases targeting various phases of the attack lifecycle. Understanding of MITRE ATT&CK framework and detections of various tactics and techniques. Experience and capability of creating interactive dashboards, alerts, reports in Splunk. Experience At least 3 years of experience with demonstrable skillsets in SIEM use-case engineering, with over 5 years of experience in cybersecurity. Previous relevant experience working in a security operational role, ideally within a Corporate, Military, or Police environment; engaging with and responding to a diverse array of internal stakeholders, including senior management. Good emotional intelligence and proven team player. Rational and calm under pressure. Fluency in the English language. Effective oral and written communication skills. Good timekeeping ability to cope with tight deadlines and achieve operational objectives. Self-motivated with the ability to carry out assigned tasks with minimum supervision. Please submit your updated resume in Word format by using the Apply Now Button. We regret that only shortlisted candidates will be notified. Email resume to tiffany@peopleprofilers.com #J-18808-Ljbffr
Apply safely
To stay safe in your job search, information on common scams and to get free expert advice, we recommend that you visit SAFERjobs, a non-profit, joint industry and law enforcement organization working to combat job scams.