Position Details
About this role
This role involves managing and optimizing enterprise SIEM platforms to improve threat detection and incident response capabilities across the organization.
Key Responsibilities
- Administer SIEM platform
- Build correlation rules
- Integrate threat feeds
- Analyze logs for anomalies
- Partner with SOC/IR teams
Technical Overview
The technical scope includes SIEM platforms like Splunk, QRadar, LogRhythm, cloud security integrations with Azure, AWS, GCP, and automation using scripting and Logic Apps, with a focus on detection engineering and threat intelligence.
Ideal Candidate
The ideal candidate is a senior cybersecurity professional with 5+ years of experience managing SIEM platforms such as Splunk, QRadar, or LogRhythm. They possess strong knowledge of threat detection, incident response, and automation, with relevant certifications and experience working in a hybrid environment.
Must-Have Skills
Nice-to-Have Skills
Tools & Platforms
Required Skills
Hard Skills
Soft Skills
Certifications
Preferred
Industry & Role
Keywords for Your Resume
Deal Breakers
Lack of 5+ years SIEM experience, No legal authorization to work in the U.S., No experience with Splunk, QRadar, or LogRhythm
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile