Posted on: 16/07/2025
Key Responsibilities :
- Architect, develop, and optimize detection content across SIEM platforms such as Microsoft Sentinel, Splunk, and Google Chronicle.
- Normalize and structure diverse log sources using schemas like Splunk CIM, Microsoft Sentinel, OCSF, and Chronicle UDM to ensure consistent detection across the board.
- Collaborate with teams including Threat Labs and Data Engineering to improve parsing, data transformation, and use case configurations.
- Perform end-to-end development, customization, and onboarding of supported and custom data sources (EDR, firewall, antivirus, proxies, OS, databases).
- Repair events with missing or incorrect data, create parser extensions, and manage flow logic for log ingestion pipelines.
- Conduct log source analysis and maintain robust documentation of data structures, parsing rules, and detection logic.
- Build and maintain monitoring reports to ensure data pipeline availability and proactively identify performance issues or gaps in data coverage.
- Continuously evaluate and refine detection content and parsing logic for high fidelity and low false-positive rates.
Required Qualifications :
- 7+ years of experience in security engineering, detection content development, or SIEM management.
- Strong hands-on experience with SIEM platforms, particularly Microsoft Sentinel, Splunk, and Chronicle.
- Expertise with multiple data models including Splunk CIM, Sentinel schemas, Chronicle UDM, and OCSF.
- Experience working with diverse log sources (e.g., EDRs, firewalls, antivirus, proxies, databases, OS logs).
- Skilled in event parsing, field extraction, normalization, and enrichment for log data.
- Familiarity with scripting/query languages such as KQL, SPL, and UDM search syntax.
- Strong understanding of SOC operations, detection engineering workflows, and threat modeling frameworks (MITRE ATT&CK, etc.).
Preferred Qualifications :
- Experience working with cloud-native and hybrid security architectures.
- Familiarity with data transformation tools and stream processing pipelines.
- Previous collaboration with threat research or threat intelligence teams.
- Security certifications such as GCIA, GCTI, or similar are a plus.
Did you find something suspicious?
Posted By
Posted in
CyberSecurity
Functional Area
Cyber Security
Job Code
1513873
Interview Questions for you
View All