Security Engineer

Overview

Remote
Depends on Experience
Contract - W2
Contract - 12 Month(s)

Skills

SIEM management
Google SecOps
CRIBL
Log Lifecycle Management
Python scripting
API
Data Visualization & Alerting
dashboards
Security Incident Response Team (SIRT)

Job Details

We're seeking for an Security Engineer for our direct client. Please review the below job Description and revert with your interest for the same.

Job Details:

Job Title: Security Engineer

Duration:9-12 Months

REMOTE(Columbus, OH)

Note: On the start date, the candidate is required to travel to the onsite location at their own expense to attend orientation, collect their access badge, and laptop. Following this initial onboarding, the position will transition to fully remote.

Job Summary

We are seeking a candidate with a strong background in security data engineering and SIEM management. The ideal candidate will be responsible for the complete lifecycle of our security logs, from ingestion to optimization and analysis.

Core Technical Skills

  • SIEM & Log Management: Deep proficiency in managing SIEM platforms, specifically Google SecOps (formerly Chronicle), and log observability pipelines, with hands-on experience in CRIBL.
  • Log Lifecycle Management: Demonstrated experience in the end-to-end log data lifecycle, including:
    • Onboarding new log sources.
    • Developing and maintaining parsers (e.g., Regex) for unparsed data.
    • Performing data validation and gap analysis to identify missing logs.
    • Implementing log reduction and filtering strategies to optimize data flow and storage costs (hot/cold storage management).
  • Automation & Scripting: Proficiency in Python scripting and utilizing vendor APIs to automate log validation, troubleshooting tasks, and data queries.
  • Data Visualization & Alerting: Proven ability to build effective dashboards for security operations and monitoring, as well as set up critical alerts based on log volume changes or security events.

Collaboration & Strategy

  • Stakeholder Management: Excellent communication and coordination skills to work effectively with external agencies for log onboarding and internal teams, such as the Security Incident Response Team (SIRT).
  • Requirements Gathering: Ability to collaborate closely with SIRT and other stakeholders to gather feedback, identify operational needs (missing data, parser improvements), and enhance detection capabilities.
  • Continuous Improvement: A proactive mindset to research and track new features and releases from Google SecOps and CRIBL, assessing their potential impact and identifying opportunities for implementation.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.