Splunk SIEM detection engineer/ Splunk SIEM / SIEM Detection Engineer/ SOC Analyst

Overview

Hybrid
$40 - $60
Contract - W2
Contract - Independent
Contract - 12 Month(s)

Skills

Splunk SIEM detection engineer
SIEM PlatformSplunk-- developing
SPL
SQL
KQL
Experience developing SOAR / response playbooks related to security alerts
MITRE ATT&CK

Job Details

Reply requested for below job opportunity. Thank you.

Splunk SIEM detection engineer

Location: NYC -3 days a week

hope all is well! We have an urgent need for a NYC based Splunk SIEM detection engineer for a client contract that we are unable to staff internally. Can you urgently help get us some resumes to review?

Extensive experience working with SIEM Platform Splunk-- developing detections using query languages (e.g. SPL, SQL, KQL), and developing dashboards for SIEM reporting

Thorough understanding of detect and respond concepts related to SOC operations

Experience developing SOAR / response playbooks related to security alerts

Experience defining and writing new SIEM detections and tuning existing detections based on alert performance and feedback from the SOC

Experience mapping SIEM detections against a threat model framework like MITRE ATT&CK

Sole contributor role with 6-8 years of experience. Will be overseen by KPMG.

Regards,

VIJAY KUMAR A

Sr. Technical Recruiter

Contact: +1 Ext 119

vkm

Cynosure Technologies, LLC

2401 Fountain View D, STE 502, Houston TX 77057

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.