Logo for FoshTech

SIEM Analyst

Key Facts

Remote From: 
Full time
Mid-level (2-5 years)
English

Other Skills

  • Communication
  • Teamwork
  • Detail Oriented
  • Analytical Thinking

Roles & Responsibilities

  • Bachelor's degree in computer science, telecommunications, cybersecurity, or a related field.
  • At least 3 years of experience in SIEM operations, log analysis, or security monitoring.
  • Hands-on experience collecting and managing logs from multiple sources (endpoints, network devices, servers, cloud services, applications, authentication systems).
  • Experience with Splunk (2+ years) and CrowdStrike (2+ years), including operating and configuring rules and settings.

Requirements:

  • Design, implement, and maintain log collection pipelines from security, infrastructure, cloud, and application systems, ensuring proper ingestion and retention in SIEM platforms.
  • Develop dashboards, visualizations, and correlation rules; create alerts to detect threats, anomalies, and security incidents; tune detections to reduce false positives.
  • Proactively hunt for threats through advanced log searches, pattern analysis, and support incident response and forensic investigations (reconstruct attack timelines, identify entry points, and lateral movement).
  • Collaborate with SOC Analysts, DevSec, IAM, Threat Hunting, and other security roles; document procedures; manage Jira tickets; and generate reports for technical and management audiences.

Job description

Our mission

We are a cutting-edge e-commerce company developing products for our technological platform. Our creative, smart, dedicated teams pool their knowledge and experience to deliver the best solutions to meet project needs while maintaining sustainable, long-lasting results. How? By making sure that our teams thrive and develop professionally. Strong advocates of hiring top talent and letting them do what they do best, we strive to create a workplace that allows for an open, collaborative, and respectful culture

The Role

You will be responsible for collecting, normalizing, analyzing, and exploiting security logs from multiple sources across the organization, ensuring they are ingested into SIEM platforms and used to detect threats, anomalies, and security incidents. You will play a key role in threat detection, incident investigation, and forensic analysis by transforming raw logs into actionable insights through dashboards, alerts, and advanced log analysis.

Key Responsibilities:

· Design, implement, and maintain log collection pipelines from multiple sources, including security, infrastructure, cloud, and application systems.

· Ensure logs are ingested, parsed, normalized, and retained correctly across SIEM platforms such as FortiAnalyzer, Splunk, CrowdStrike, and others.

· Maintain data quality and consistency across all log sources.

· Design, build, and maintain dashboards and visualizations to provide visibility into security posture, threats, and operational metrics.

· Create, tune, and maintain correlation rules and alerts based on:

o Attack patterns

o Indicators of compromise (IOCs)

o Behavioral anomalies

o Custom detection use cases defined by the Information Security Team

· Continuously analyze logs to identify suspicious, anomalous, or out-of-the-ordinary behavior.

· Proactively hunt for threats by performing advanced log searches and pattern analysis.

· Support incident response and forensic investigations by:

o Searching historical logs

o Reconstructing attack timelines

o Identifying entry points, lateral movement, and attacker activity

· Collaborate with SOC Analysts, Dev Security, IAM, Threat Hunting, and other security roles during incident investigation and response.

· Validate alerts and detections to reduce false positives and improve detection quality.

· Ensure all detections, investigations, and findings are properly documented and tracked via tickets (Jira).

· Document new procedures or update existing ones for log management, detection, and investigation.

· Ensure documentation is accurate, comprehensive, and delivered on time.

· Create reports based on SIEM data for operational, technical, and management audiences.

· Engage in ongoing training and professional development to stay current with emerging threats, attack techniques, and detection strategies.

· Share knowledge and expertise with the team to foster a culture of security awareness and continuous improvement.

· Adhere to the organization's different policies.

· Keep your work organized and traceable through tickets (Jira).


Knowledge and skills you need to have

· Studies in computer science, telecommunications, cybersecurity, or other related academic fields.

· At least 3 years of work experience in SIEM operations, log analysis, or security monitoring roles.

· Hands-on experience collecting and managing logs from multiple sources (endpoints, network devices, servers, cloud services, applications, authentication systems, etc.).

· At least 2 years of experience with Splunk is required (by operating and configuring rules and settings).

· At least 2 years of experience working with CrowdStrike is required.

· Experience working with other SIEM and log platforms such as FortiAnalyzer, New Relic, ManageEngine AD Audit, Axonius, or similar.

· Experience creating dashboards, visualizations, and reports based on log data.

· Experience in defining and tuning alerts and correlation rules.

· Knowledge of scripting or query languages used in SIEM platforms (e.g., SPL, KQL, SQL-like queries).

· YARA rules.

· Regular expressions (regex).

· Familiarity with security tools generating logs, such as firewalls, EDR, IAM, cloud platforms, and application security tools.

· Strong analytical mindset with the ability to identify patterns and anomalies in large datasets.

· Experience supporting incident response and forensic investigations through log analysis.

· Ability to work independently and as part of the Information Security Team under minimal supervision.

· Eager to learn and continuously improve detection capabilities.

· Strong documentation and reporting skills.

· Technical skills:

o Solid foundations in networking, operating systems, authentication flows, and cybersecurity.

o Ability to understand how logs reflect system and user behavior across different platforms.


Additional requirements, not essential but "nice to have":

· Any cybersecurity certification.

· Experience with log normalization standards and detection methodologies.

· Familiarity with MITRE ATT&CK and threat detection frameworks.

· Experience with threat hunting activities.

· Familiarity with forensic analysis concepts and incident response workflow

Related jobs

Other jobs at FoshTech

We help you get seen. Not ignored.

We help you get seen faster — by the right people.

🚀

Auto-Apply

We apply for you — automatically and instantly.

Save time, skip forms, and stay on top of every opportunity. Because you can't get seen if you're not in the race.

AI Match Feedback

Know your real match before you apply.

Get a detailed AI assessment of your profile against each job posting. Because getting seen starts with passing the filters.

Upgrade to Premium. Apply smarter and get noticed.

Upgrade to Premium

Join thousands of professionals who got noticed and hired faster.