As an Infosec Specialist, you will be responsible for designing, implementing, configuring, and maintaining SIEM platform to ensure efficient threat monitoring, detection, and response.
Requirements
- 7+ years prior experience in SOC environment with hands-on experience in SIEM administration and usecase development
- Proficient in SIEM platforms such as Splunk, Palo Alto Cortex, and Google SecOps
- Strong troubleshooting skills to resolve technical issues with SIEM
- Expertise in collecting, parsing and normalizing log data from various sources such as servers, network devices, Cloud platforms and applications
- Strong understanding of networking protocols (TCP/IP, HTTP, SSL/TLS) and technologies such as Next-gen firewalls, intrusion detection/prevention systems (IDS/IPS), Proxy & DNS
- Understand cloud platforms (like AWS, Azure), their logging tools and integrate logs using agents, APIs, or native connectors via transport methods like Syslog, S3, Event Hub, Pub/Sub, or HTTP
- Deep understanding of MITRE ATT&CK framework (tactics, techniques & procedures)
- Experience in developing, tuning & correlating the detection rules to reduce false positives and enhance detection accuracy
- Strong Knowledge in threat intelligence sources (commercial and open source) and proficient in automating alert enrichment using threat intel, familiar with STIX/TAXII standards for intelligence sharing
- Knowledge of security frameworks, like PCI-DSS, HIPAA, ISO 27001 and SOX
- Hands-on experience with scripting languages such as Python, PowerShell and REST APIs
- Proficient in creating dynamic dashboards that clearly display security posture and event trends