Determines the lifecycle of security information and event management (SIEM) rules, reports, and dashboards to present actionable threats to Intrusion Analysts by refining existing rule logic; collaborating within the Cybersecurity area; creating new rules and reports; and removing outdated rules and reports. Collaborates with other security information and event management (SIEM) engineers on architecture and engineering design by leading strategy and design meetings; authoring SIEM roadmaps; and coordinating SIEM product evaluations. Partners with internal customer teams (for example, Compliance, Cybersecurity Risk Assessment, Infrastructure) to ensure appropriate threat monitoring by overseeing the gathering of information about system and software solutions in accordance with company audit trail standards. Manages security information and event management (SIEM) infrastructure by monitoring metrics for efficiency and effectiveness; acting as an escalation point during software and hardware upgrades; managing and approving documentation related to incident and change tracking; managing and approving SIEM documentation; participating in pager rotation for on-call support; acting as an escalation point for advanced SIEM troubleshooting; establishing and maintaining vendor partnerships; and following up to ensure resolution of open trouble tickets.
- 3 years' experience with a log analysis/SIEM product (for example, Splunk, ArcSight, Qradar, Nitro) OR 3 years' experience with manual security log review and analysis (for example, Windows Event Log, Linux Syslog).
- 1 year experience creating and presenting technical strategies and technical solution recommendations. 1 year experience leading cross-functional teams.
- Building, developing, and implementing quality programs/systems, Information Security, Technical Strategy
- CCNA - Cisco Certified Network Administrator, CISA - Certified Information Systems Auditor, CISSP - Certified Information Systems Security Professional, GCIH - GIAC Certified Incident Handler