Overview
Remote
Contract - W2
Contract - 12 Month(s)
Skills
Splunk
SIEM
Elastic
Qradar
MITRE
SPL
Threat detectin
scriptin
Job Details
Amtex Systems Inc is an information technology and talent solutions company offering talent and BI consulting to the companies in US for over 25 years.
Our solutions are designed to fill resource gaps, by providing the right candidates who deliver value to the organization. Our propensity to nurture and build strong relationships with our clients helps us better understand their business demands and gives us the ability to provide services that are on time and rise above the rest.
Job Title: Threat Detection Engineer
Location: Remote
Employment Type: Contractor
Location: Remote
Employment Type: Contractor
Job Summary:
The ideal candidate will be responsible for designing, implementing, and maintaining advanced threat detection use cases within a hybrid SIEM environment. This role requires a deep understanding of security information and event management (SIEM), threat hunting, and incident analysis to protect our organization from emerging cyber threats.
The ideal candidate will be responsible for designing, implementing, and maintaining advanced threat detection use cases within a hybrid SIEM environment. This role requires a deep understanding of security information and event management (SIEM), threat hunting, and incident analysis to protect our organization from emerging cyber threats.
Key Responsibilities:
Develop, optimize, and manage SIEM dashboards, searches, and alerts to identify potential security threats in real-time.
Create and refine custom SIEM use cases, correlation rules, and detection logic to enhance threat visibility across systems and networks.
Perform threat hunting and analyze log data to proactively identify anomalies and gaps in current use case library.
Collaborate with incident response teams to investigate and mitigate security incidents, providing detailed forensic analysis when required.
Maintain and tune SIEM deployments, ensuring data integrity, performance, and scalability.
Integrate SIEM with other security tools and data sources to improve detection accuracy and coverage.
Stay current on evolving cyber threats, attack techniques, and industry best practices to continuously improve detection strategies.
Document processes, detection methodologies, and incident findings for knowledge sharing and compliance purposes.
Qualifications:
7+ years of experience in cybersecurity, with at least 4 years focused on SIEM use case development.
Highly proficient in Splunk Enterprise Security (ES), including SPL (Search Processing Language), dashboard creation, and alert configuration.
Strong understanding of network protocols, system logs, and security event analysis.
Experience with threat intelligence integration and applying MITRE ATT&CK framework to detection efforts.
Familiarity with scripting languages (e.g., Bash, Python, PowerShell) for automation and data analysis is a plus.
Familiarity with offensive security tactics & techniques such as red teaming and advanced penetration testing is a plus.
Relevant certifications such as Splunk Certified Power User, Splunk Certified Admin, or cybersecurity certifications such as OSCP, GPEN, GCIH, GCFE are highly preferred.
Excellent problem-solving skills and the ability to work under pressure in a fast-paced environment.
Preferred Skills:
Knowledge of additional SIEM platforms or security tools (e.g., Elastic, QRadar, CrowdStrike).
Ability to mentor team members and contribute to a collaborative security culture.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.