Splunk SIEM detection engineer (MITRE ATTACK)

  • New York, NY
  • Posted 9 hours ago | Updated 9 hours ago

Overview

Hybrid
$50 - $60
Accepts corp to corp applications
Contract - Independent
Contract - W2
Contract - 6 Month(s)

Skills

SIEM
SPL
SQL
Splunk
System On A Chip
Threat Modeling

Job Details

Hello, I hope you are doing great today!

We are looking for Splunk SIEM detection engineer for Dallas, TX - Hybrid facility for more details please find the below JD. If you are interested, please revert me back with your updated resume

Job title: Splunk SIEM detection engineer

Location: NYC Hybrid 3 days

Client: KPMG/Covasant

Duration: Long Term

Visa: Except OPT/CPT/s any visa is fine

  • Extensive experience working with SIEM Platform Splunk-- developing detections using query languages (e.g. SPL, SQL, KQL), and developing dashboards for SIEM reporting
  • Thorough understanding of detect and respond concepts related to SOC operations
  • Experience developing SOAR / response playbooks related to security alerts
  • Experience defining and writing new SIEM detections and tuning existing detections based on alert performance and feedback from the SOC
  • Experience mapping SIEM detections against a threat model framework like MITRE ATT&CK
  • Sole contributor role with 6-8 years of experience. Will be overseen by KPMG.
  • Availability for 30-40 hours a week.
  • NY Based and can be onsite with KPMG team at client in Midtown 3 days a week
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.