Lead the integration of alarm/data feeds from multiple SIEM platforms into Microsoft Sentinel, configure and manage Cribl pipelines, and design and implement data normalization strategies.
Requirements
- 10–15 years of experience in cybersecurity
- Strong technical background in SIEM tools and security data architecture
- Proven experience with Microsoft Sentinel, including data connectors, KQL, and automation via Logic Apps
- Hands-on expertise in Cribl: stream design, data parsing, enrichment, routing, and performance tuning
- Experience with multiple SIEM platforms (e.g., Splunk, LogRhythm, Securonix) and their alarm/log structures
- Scripting experience with Python and PowerShell for integration and automation tasks
- Strong knowledge of security frameworks (MITRE ATT&CK, NIST, OWASP, etc.) and their application in real-world use cases
Benefits
- Unisys is proud to be an equal opportunity employer that considers all qualified applicants without regard to age, blood type, caste, citizenship, color, disability, family medical history, family status, ethnicity, gender, gender expression, gender identity, genetic information, marital status, national origin, parental status, pregnancy, race, religion, sex, sexual orientation, transgender status, veteran status or any other category protected by law