Match score not available

Qradar_Persistent

Remote: 
Full Remote
Contract: 
Experience: 
Junior (1-2 years)
Work from: 

Offer summary

Qualifications:

Minimum 8 years cybersecurity experience, Experience in SIEM solutions like IBM QRadar, Splunk, Securonix.

Key responsabilities:

  • Deploy and manage SIEM solutions like IBM QRadar
  • Develop and implement security use cases
CodersBrain logo
CodersBrain Management Consulting SME https://www.codersbrain.com/
201 - 500 Employees
See more CodersBrain offers

Job description

Logo Jobgether

Your missions


JD - Qradar SIEM implementation SME

Job Description-
 Minimum 8 years of full-time experience in cybersecurity experience. Proficient Experience in
Design, Deployment and Management of several SIEM solutions like IBM QRadar ( Preferably),
Splunk, Securonix, Exabeam, Azure Sentinel. Splunk
 Proficient Experience in SOAR Integrations. Proficient understanding of IT infrastructure and
security. Proficient understanding of Security Operation procedures and processes. Detailed
knowledge in system security architecture and security solutions
Responsibilities:
 3-5 years of experience in deploying and managing SIEM and more 6-10 years of experience in
Cyber Security and SOC operations
 6+ years' experience in Architecting, administrating, and maintaining several SIEM solutions like
IBM QRadar, Securonix, Exabeam, Azure Sentinel. Configure, administer, and manage several
SIEM solutions like IBM QRadar ( Preferably) ,Azure Sentinel, Splunk, Securonix, Exabeam.
 Identify and implement Security use cases and develops correlation and detection rules within
SIEM solution (IBM QRadar), reports and dashboards to detect emerging threats.
 Develop information security and incident response workflows, procedures and best
practices and publish them as playbooks in IBM Qradar SOAR platform.
 Integrate on-prem and cloud data sources using various data connection methods. Create
custom data connectors for non-standard technologies deployed in the tech stack.
 Responsible for writing and developing custom scripts, reports and programs as needed Identify
and establish metrics.
 Responsible for proper operation, tuning and performance of SIEM correlation Engines
 Prepare documentation for all analytics and data connectors. Prepare workbooks for SOC
Operations, CIRT to track incidents and remediation efforts.
 Prepare automation playbooks to improve the efficiency of incident response. Responsible for
writing Runbooks, Standard Operating Procedures (SOPs) and design documents.
 Responsible for preparing architecture HLD and LLD.
 Responsible for delivering the end-to-end IBM QRadar security architecture and design artifacts
Recommends and participates in the design and implementation of standards, tools, and
methodologies. Good analytical and communication Tools Knowledge. IBM QRadar (QRoc),
Splunk, Securonix, Azure Sentinel, Exabeam, IBM Resilient, Cyware

Required Technical and Professional Expertise:-

 7+ years of experience in IT security with at least 5+ Years in SOC.
 Mindset of cyber security Engineer but leverage that in Implementation profile.
 Expertise in Security Device Management SIEM, Qradar, incident response, Log source
integration, Use case Development with special focus on custom use cases, device
integration, API log source integration, SOAR playbooks development.
 Proficient in incident response processes - detection, triage, incident analysis, remediation
and reporting
 Ability to multitask and work independently with minimal direction and maximum
accountability.

Must Have Skills-
Incident Management ,Security, Qradar SIEM Use case development/Alert Fine tuning, API Integrations,
Log source integration QRADAR, SOAR Playbook development EPS mangement, Performance, Analytics,
Remediation, Automation, SIEM

Required profile

Experience

Level of experience: Junior (1-2 years)
Industry :
Management Consulting
Spoken language(s):
Check out the description to know which languages are mandatory.

Information Security Analyst Related jobs