Hybrid SIEM and SOAR Analyst

Posted last month

Apply now

About the role

  • Design and implement cutting-edge technology to improve security posture across global deployment
  • Manage, enhance and monitor the enterprise log management and security orchestration platforms
  • Maintain the current customer managed Splunk and SIEM infrastructure
  • Responsible for log onboarding and alert monitoring setup in Splunk Cloud and other SIEM products
  • Identify opportunities to enhance current baseline processes and configuration
  • Monitor the health of customer managed asset and vendor managed Splunk infrastructure configuration
  • Work with key stakeholders (Security Operations Center, IT, Business, Corporate Support Functions) to gather requirements and communicate priorities
  • Define SIEM and SOAR platform standards including data schema, modelling, normalization, monitoring and alerting
  • Develop metrics and dashboards to measure effectiveness of SIEM/SOAR coverage and monitoring over time
  • Research and adopt industry best practices and maintain platform documentation and standard operating procedures
  • Develop scripts, RegEx, and automation for detection, alerts, and operational tasks
  • Respond to and help resolve information security incidents and breaches to protect information system assets and confidential data
  • Conduct fraud analysis and threat detection and generate reports using SIEM & SOAR data
  • Integrate logs and approaches for Servers, security platforms, middleware, Clouds (SaaS, PaaS, IaaS), and Containers

Requirements

  • Minimum of 3+ years of experience in technology with emphasis on cyber security
  • At least 2+ years of experience in SIEM and SOAR products such as Splunk, Elastic, Datadog or Cribl
  • At least 1+ years of experience in Data Lake and data warehouse using products such as AWS S3, Snowflake, Databricks
  • Experience with scripting is highly preferred like Python or Ansible
  • Experience in creating trending, metrics, and management reports
  • Working knowledge in RegEx, Splunk search language is required
  • Knowledge and experience operating in a hybrid-cloud environment
  • Knowledge of modern security principles and their practical applications
  • Knowledge and experience in AWS or Azure
  • Knowledge and experience with programming language to automate tasks such as Python or PowerShell
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field, or relevant industry certifications (equivalent work experience acceptable)
  • Ability to develop different scripts and products (RegEx) for configuring policy to detect security alerts
  • Ability to conduct fraud analysis and threat detection
  • Knowledge of various applications and systems including Servers, security platforms, middleware, Clouds (SaaS, PaaS and IaaS), Containers
  • Ability to understand security risks and controls, analyze methods of control, and implement cost-justified solutions
  • Willingness/ability to work at MUFG office or client sites four days per week and remotely one day

Benefits

  • This role may also be eligible for certain discretionary performance-based bonus and/or incentive compensation
  • Comprehensive health and wellness benefits
  • Retirement plans
  • Educational assistance and training programs
  • Income replacement for qualified employees with disabilities
  • Paid maternity and parental bonding leave
  • Paid vacation, sick days, and holidays
  • Competitive benefits package (Total Rewards program)
  • Hybrid work schedule: work at an MUFG office or client sites four days per week and work remotely one day

Job title

SIEM and SOAR Analyst

Job type

Experience level

Mid levelSenior

Salary

$75,000 - $138,000 per year

Degree requirement

Bachelor's Degree

Location requirements

Report this job

See something inaccurate? Let us know and we'll update the listing.

Report job