SIEM Use-Case Engineer
Job Description:
Industry: German MNC - Automotive
Location: Jurong East
This is a 1-Year Contract role (Renewable, Subject to Approval)
Primarily accountable for overseeing the engineering, development and maintenance / continuous improvement of threat detection use-cases scenarios within the SIEM (Splunk ES). Additionally, involved in the engineering and development of custom rules in the EDR (CrowdStrike) to swiftly detect potential threats attacks. Another responsibility involves creating transparency of existing detection capabilities by mapping them to the MITRE ATT&CK framework.
- Support in planning and executing regional IT Infrastructure strategy and aligned with company strategy.
- Proactively create, test and tune new detection use-cases in the SIEM and custom rules in the EDR.
- Review and enhance existing detection use-cases using e.g., Machine Learning or User & Entity Behavior Analytics (UEBA).
- Map the detection use-cases to the MITRE ATT&CK framework to determine the SIEM monitoring coverage.
- Perform regular updates to threat detection engineering playbooks, processes, and documentations.
- Work closely with the SOC to challenge detection and prevention capabilities.
- Identify and implement SIEM use-cases that address blind spots.
- Coordinate with log onboarding team and SIEM architect to validate new log-sources on-boarded for compliancy, improve performance on SIEM backend
- Collaboration with Service Operations team to address challenges, process fulfillment, documentations etc, and improvement of Service Operations Quality.
- Provide governance on topic which related to operational stability.
Qualification
Specific Knowledge
- Intense knowledge in using Splunk Enterprise Security (ES)
- Intense knowledge in developing and tuning detection use-cases (Correlation Searches) in Splunk based on Data Models
- Experience in Machine Learning and Risk Based Monitoring in Splunk is an advantage
- Ability to analyse and interpret security logs and events to identify potential threats and attack patterns
- Experience in validating data source compliant using the common interface model (CIM)
- Experience of setting up and utilize data models in Splunk
- Deep understanding of cyber security concepts to create detection use-cases targeting various phases of attack lifecycle
- Understanding of MITRE ATT&CK framework and detections of various tactics and techniques
- Experience and capable of creating interactive dashboards, alerts, reports in Splunk
Experience
- At least 3 years of experience with demonstrable skillsets in SIEM use-case engineering, with over 5 years of experience in cybersecurity.
- Previous relevant experience working in a security operational role, ideally within a Corporate, Military, or Police environment; engaging with and responding to a diverse array of internal stakeholders, including senior management.
- Have good emotional intelligence and is a proven team player
- Rational and calm under pressure
- Fluency in the English language
- Effective oral and written communication skills
- Good timekeeping ability to cope with a tight deadline and achieve operational objectives
- Self-motivated with the ability to carry out assigned tasks with minimum supervision
Please submit your updated resume in Word format by using the Apply Now Button.
We regret that only shortlisted candidates will be notified
Email resume to tiffany@peopleprofilers.com
People Profilers Pte Ltd, 20 Cecil Street, #08-09, PLUS Building, Singapore 049705.
Tel: 6950 9722
http://www.peopleprofilers.com
EA License Number: 02C4944
Registration Number: R1111371
Posting Personnel: Tiffany Ong Meng Yen
Required Skills:
Automotive Tactics Emotional Intelligence Splunk Resume Prevention Intelligence Transparency Onboarding Registration Machine Learning Continuous Improvement LTD Analytics Infrastructure Strategy Security Pressure Email Planning Maintenance Engineering English Communication Management