Match score not available

Security Information and Event Management (SIEM) Engineer

Remote: 
Full Remote
Contract: 
Work from: 

Offer summary

Qualifications:

5-8 years of hands-on experience with SIEM tools such as QRadar, Splunk, and Microsoft Sentinel., Strong understanding of log management and monitoring processes., Experience in designing and configuring SIEM solutions and integrating log sources., Familiarity with Elastic Stack components like Elasticsearch, Logstash, and Kibana..

Key responsabilities:

  • Design, deploy, and configure SIEM solutions for effective threat detection.
  • Integrate various log sources into the SIEM platform and develop correlation rules.
  • Monitor and analyze system logs for anomalies and potential threats.
  • Maintain and optimize the overall health and performance of the SIEM environment.

TechBiz Global logo
TechBiz Global Startup https://www.techbiz.global
51 - 200 Employees
See all jobs

Job description

About us:

TechBiz Global is a leading recruitment and software development company. Our diverse, globally distributed team provides IT recruitment, outstaffing, outsourcing, software development, and different consulting services with a primary focus on making our partners achieve their business goals successfully.

With headquarters in Germany we have successful clients all over the world. We can understand your unique needs. Our team has hands-on experience with the challenges that come with rapid growth and the IT sector. That’s why all of our offerings are built with a tech mindset.

Job Summary:

We are seeking for client for a one month project highly skilled and experienced SIEM Engineer with 5-8 years of hands-on experience working on Security Information and Event Management (SIEM) tools such as QRadar, Splunk, Microsoft Sentinel, Elastic Stack (Elasticsearch, Logstash, Kibana), and other SIEM platforms. The candidate will be responsible for the design, deployment, configuration, and management of SIEM solutions, ensuring efficient monitoring and proactive threat detection across the organization. This role involves collaboration with security teams to optimize incident detection, analysis, and response processes.

Key Responsibilities:

SIEM Implementation & Configuration:

  • Design, deploy, and configure SIEM solutions, including Elastic Stack (Elasticsearch, Logstash, Kibana), Wazuh, QRadar, Splunk & Microsoft Sentinel.

  • Integrate various log sources (e.g., firewalls, IDS/IPS, network devices, applications),/OT/IOT into the SIEM platform.

  • Develop and fine-tune correlation rules, dashboards, and alerts for proactive threat detection.

  • Perform system upgrades, patches, and manage the overall health of the SIEM environment.
    Log Management & Monitoring:

  • Ensure proper log ingestion from multiple data sources, including Elasticsearch and Kibana, and troubleshoot any logging issues.

  • Maintain data retention policies, manage storage, and optimize SIEM performance.

  • Monitor and analyze system and security logs for anomalies, potential threats, or suspicious activities.

    Elastic Stack Management or any open source like Wazuh:

  • Configure and maintain Elasticsearch clusters for log storage and search functionality.

  • Utilize Kibana to create custom dashboards, visualizations, and reports for security monitoring.

  • Work with Logstash or other log shippers for effective data parsing and enrichment before SIEM ingestion.

 

Required profile

Experience

Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Collaboration
  • Problem Solving

Event Manager Related jobs