Job Description

Duties & Responsibilities
  • Engineer and maintain SIEM ingestion pipelines, including data connectors, parsers, normalization, and enrichment across endpoint, network, cloud, identity, and app telemetry sources. 
  • Build, tune, and update detection rules, correlation logic, and analytics aligned to MITRE ATT&CK, threat intelligence, and evolving TTPs. 
  • Operate and enhance Cribl Stream and Cribl Edge pipelines for log routing, transformation, filtering, enrichment, and delivery optimization. 
  • Support onboarding of new log sources, including schema mapping, troubleshooting ingestion failures, and validating data quality and completeness. 
  • Assist in reducing false positives and improving signaltonoise through SIEM tuning, enrichment enhancements, and Cribl workflow adjustments. 
  • Develop queries, dashboards, and data models used by SOC and IR teams for investigations, monitoring, and hunting. 
  • Monitor telemetry ingestion metrics, SIEM health, license usage, and Cribl pipeline performance; identify and resolve operational issues. 
  • Perform investigation support by validating detections, analyzing telemetry gaps, and implementing fixes to improve future coverage. 
  • Mentor junior analysts and engineers on SIEM query languages (KQL/SPL), detection development, logging best practices, and Cribl pipeline fundamentals. 
  • Maintain SIEM and telemetry documentation including data dictionaries, ingestion maps, detection catalogs, and engineering runbooks.


Requirements

Basic Qualifications
  • Proficient in various cybersecurity frameworks and standards.
  • Experience with security tools such as SIEM, firewalls, and intrusion detection systems.
Preferred Qualifications
  • Relevant certifications (e.g., CISSP, CISM, CEH).
  • Master’s degree in Cybersecurity or related field.


Apply for this Position

Ready to join ? Click the button below to submit your application.

Submit Application