SIEM Engineer - Immediate Role

Remote β€’ Posted 4 hours ago β€’ Updated 4 hours ago
Contract W2
Contract Independent
Contract Corp To Corp
No Travel Required
Able to Sponsor
Remote
Depends on Experience
Fitment

Dice Job Match Scoreβ„’

πŸ”— Matching skills to job...

Job Details

Skills

  • Palo Alto
  • Nessus
  • SIEM Engineer
  • Cribl
  • QRadar

Summary

Role Title: SIEM Engineer - 12+ Years of experience Required.

NO STUDENT VISAS (NO OPT / CPT)

Remote Role

Required Skills: IBM QRadar SIEM; Nessus; Palo Alto EDR; Palo Alto XDR;SIEM;SOC/SIEM; Use cases; Supporting; Palo Alto XSIAM; Cribl

Preferred Skills: Prior experience engaging with State agencies/employees as clients

Responsibilities Primary engineer managing SIEM platform with IBM QRadar and/or Palo Alto XSIAM and supporting delivery for Managed Security Services to a State Government client to provide timely, accurate, planned completion and implementation of security services, which must be available for 24x7x365 support.

  • Leads primary day-to-day SIEM interactions with project team and State cybersecurity staff. Manages platform health, performs upgrades, including managing deployed sensors and collectors. Interacts with SOC analysts to tune alerts and use cases, to include integrations with client.
  • Previous hands-on QRadar engineering and configuration experience required as system will be undergoing platform upgrades. Any Palo Alto XSIAM training
  • Adding new log sources to existing QRadar and/or XSIAM, configure use cases, alerts, etc.
  • Perform QVM scans
  • Conduct Nessus SCSEM scans
  • Triage scan finds, publish results, fine tune alerts
  • Ensure software is developed to meet functional, non-functional, and compliance requirements.
  • Code solutions and perform unit testing.
  • Ensure the solution can be integrated successfully into the overall application/system with clear, robust, and well-tested interfaces.
  • Perform troubleshooting, work through complex requirements/solutions, and provide assistance/coaching with the creation of QRadar search queries and dashboards.
  • Provide engineering and administration in supporting complex and large Splunk environments consisting of search heads, indexers, deployment servers, heavy/universal forwarders, etc.
  • Review and architect scalable and organized frameworks for security automation and orchestration and pre-investigation analysis and triage of alerts from various sources like detection pipelines, exploitable vulnerabilities and reports.
  • Maintain strong partnership with Detection & Response leadership and other teams in Security Org
Employers have access to artificial intelligence language tools (β€œAI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: 10115170
  • Position Id: 8906302
  • Posted 4 hours ago
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

Remote or Arkansas

β€’

9d ago

Easy Apply

Contract, Third Party

$DOE

Remote or Hybrid in New York, New York

β€’

9d ago

Easy Apply

Contract

Depends on Experience

Remote or Ames, Iowa

β€’

Today

Easy Apply

Contract

Remote or Milwaukee, Wisconsin

β€’

Today

Full-time

Search all similar jobs