Job Description
What success looks like in this role:
Monitor and analyse alerts generated by Google SecOps SIEM, using UDM Search to identify suspicious activities and potential compromises and escalate issues as appropriateConduct proactive threat hunting using chronicle search, threat intel feeds, and entity correlationSupport log ingestion and normalization using SecOps ingestion tools (Forwarder, Collector, Ingestion APIs, and UDM-based parsers)Monitor ingestion pipeline health by validating telemetry flow from Forwarders, Collectors, Ingestion APIs, and third‑party connectorsUse SIEM Dashboards to monitor UDM event ingestion metrics, detection volumes, alert counts, IOC activity, and ingestion issues to identify performance degradationContinuously track threat intelligence enrichment performance to ensure indicators and context are being correctly applied to alerts.Provide the input into SOAR playbooks to reduce analyst toil...
Apply for this Position
Ready to join Unisys? Click the button below to submit your application.
Submit Application