The SIEM Platform Management Senior Advisor will be expected to leverage QRadar in order for :
Standard Log Sources On-Boarding, by taking part in the planning, testing and implementation of the new device or host deployment projects and providing the SIEM requirements for its successful on-boarding
New Log Source Type On-Boarding Projects, by providing assistance on onboarding new appliances / servers into the SIEM platform, providing requirements and verifying that the on-boarding has been done successfully
Configuration Back-up, by creating an automatic back-up task or on demand based on an agreed schedule with the Customer and performing weekly reviews of the back-up mechanisms
Maintaining the SIEM platform up to date by downloading, testing and performing platform updates
Third party Security Feed testing and integration
Risk / Compliance statistical reports of the current logging status for the whole environment, or for specific groups or departments.
Creating and implementing SIEM data retention policy, based on Customer requirements
Expanding the SIEM Infrastructure, by providing the required change details in a timely manner to the Customer
Integrate the SIEM platform with 3rd party technologies, when applicable (e.g. Tripwire)
Threat Use Case Planning, by identifying the threat use cases that are of upmost importance to the organization by means of reviewing Enterprise risk management, cyber risk assessment reports and 3rd party Security feeds
Threat Use Case Design, which will include an understanding of attacks through attack trees, recognizing threats via indicators, and the gathering of intelligence for research and planning purposes
Threat Use Case Builds, by specifying an alert description, criticality, applicable log sources, log events and thresholds for the alert, response phases and objectives and the alert workflow
Correlated SIEM rule proposal and subsequent creation, based on identified threat use cases
Threat Use Case documentation and hands-on training on proposed correlated rules
Interfacing with the SIEM vendor, for the purposes of support case management
Essential Requirements :
5+ years of experience in cyber security
Previous experience with Splunk administration and content development
University education, degree in Computer Science, Information Systems, or Network and Security
Detailed knowledge of security technologies and trends.
Desirable Requirements :
Possess active industry certifications such as Comptia Security+, SSCP, GCIH, GCIA or related
Working knowledge / experience of network systems security principles and applications
Fundamental understanding of defense strategies.
Location : Campus Building, Boulevard Iuliu Maniu No 6, near Politehnica metro station.
Working hours : Monday - Friday, 10 am - 7 pm.
Here are more reasons to join our team!
Take a look at what we offer and feel free to reach out to us for more details!
Development programs and cyber security trainings / certifications because we grow together
Internal Career Progression Plan for top performers - we encourage you to follow internal opportunities
Regular workshops we are the largest community of cyber security experts and we enjoy sharing our best practices during our Communities of Practice and to our trainees
Great location multiple ways to get to work subway, tram, even your own car also your lunch just around the corner - you can find us at AFI Park 4-5 and Campus 6
Work from home policy your time matters
Relaxation Area because a good gaming break never hurt nobody
Weekly professional massage sessions and even our own massage chairs
Medical and Dental subscription flexible package and you can include your family members
Weekly fresh fruits vitamins are important for your health
Annual Performance Bonus
Internal Employee Rewarding System / Tool we value working as a team and we recognize each other’s efforts