Cortex XSIAM Consultant
Remote
Job Id:
140705
Job Category:
Job Location:
Remote
Security Clearance:
No Clearance
Business Unit:
Piper Companies
Division:
Piper Enterprise Solutions
Position Owner:
Chase Reese
Piper Companies is seeking a Remote SIEM Engineer (Cortex XSIAM) to join a premier cyber security organization. The SIEM Engineer will work with clients to determine a suitable detection strategy, helping to protect customers from threats, by designing and implementing correlation rules.
Responsibilities of the SIEM Engineer include:
- Work with technical lead to develop log ingestion strategy
- Contribute to detection strategy based on industry best practices
- Detail step-by-step process to ingest high-quality log sources
- Perform log source monitoring and optimization
- Create high-quality correlation rules
- Tune log sources and correlation rules
- Be an Subject Matter Expert (SME) for SIEM, Correlation, and Log Source Ingestion
Qualifications for the SIEM Engineer include:
- 6+ years of deploying and integrating (SIEM) to enterprise to large enterprise-level
- Coordinating and conducting event collection, log management, event management, compliance automation, and identity monitoring activities using (SIEM) platforms
- The ability to create and develop correlation and detection rules, within a (SIEM) to support alerting capabilities
- Experience working with and deploying a variety of SIEM technologies (i.e. Splunk, IBM QRadar)
- Strong Regular Expression skills
Compensation for the SIEM Engineer includes:
- Salary: $135,000 – $160,000 depending on experience
- Full benefits: Healthcare, Dental, Vision, 401k, Flexible work schedule
This job opens for applications on 4/14/2025. Applications for this job will be accepted for at least 30 days from the posting date.
Keywords: #LI-CR2 #LI-REMOTE
SIEM Engineer, SIEM Consultant, Cortex XSIAM, log migration, detection strategy, log ingestion, correlation rules, industry best practices, customer requirements, log source monitoring, automation, technical documentation, event collection, log management, compliance automation, identity monitoring, Regular Expression, Security Analysis & Response, Security Operation Centers, CISSP, GIAC, technical design documentation