Home

Remote Position || SIEM Engineer || State of MD at Remote, Remote, USA
Email: [email protected]
Direct client position

Position:
Microsoft Sentinel SIEM Engineer

Duration: 1-year

Location:
Annapolis, Maryland (100% Remote)

Client:

State of Maryland

Description:

Resource Qualifications

The Offeror shall have one (1) year of experience in providing recruitment, staffing, and/or otherwise providing professional consulting services.

The Offeror shall propose resource(s) that meet the following minimum qualifications:

BA/BS degree in Computer Science, Business Management, or an IT related field (as determined by the AOC).

The AOC prefers Offeror proposed resource(s) to have the following qualifications:

Three (3) years experience with Azure Sentinel.

Three (3) years experience with Kusto Query Language.

One (1) year experience with Information Security.

Active Microsoft Security Operations Analyst Associate certification. 

SCOPE OF WORK

Offeror proposed resource(s) shall be responsible for the following:

The SIEM Engineer is responsible for designing, implementing, and managing the Microsoft Sentinel SIEM solution to collect, analyze, and visualize data from various sources within the Judiciary. This role involves managing the SIEM environment, creating dashboards, and ensuring the effective use of SIEM's capabilities to monitor, detect, and respond to security threats and operational insights for the consumption of the Security Analysts. The Microsoft Sentinel SIEM Engineer will work closely with security analysts, and stakeholders to optimize data intelligence and drive informed incident detection and response.

Essential Functions:

SIEM Configuration:

Design and deploy SIEM resources, including configuring analytics rules, playbooks, Azure logic apps and data connectors, to support data collection and analysis needs.

Optimize SIEM configurations to ensure efficient data storage, retrieval, and search capabilities.

Data Collection and Integration:

Collaborate with system owners to identify available data sources and drive initiatives to ingest that system data.

Develop data ingestion strategies, create data inputs, and set up data source integration for various log and event data types.

Design and implement data normalization and transformation processes for consistent and accurate analysis.

Dashboard and Visualization Development:

Design and create interactive dashboards, reports, and visualizations using SIEM's capabilities.

Present data insights in a clear and actionable manner to support decision-making processes.

Develop data visuals for the SOC displays screens.

Search, Queries and Alerts:

Develop and optimize analytics rules and alert mechanisms to proactively monitor for security threats, anomalies, and operational issues.

Configure alerts to trigger automated responses or notifications based on predefined criteria.

SIEM App Development:

Build custom SIEM apps and add-ons to extend functionality and support specific agency requirements.

Collaborate with development teams to integrate SIEM with other systems and tools
.

Security and Compliance:

I
mplement security controls and best practices to protect data stored in SIEM and ensure compliance with relevant regulations and standards.

Monitor and analyse security-related events to detect and respond to potential threats.

Training and Documentation:

Provide training and guidance to other JIS SOC team members on Microsoft Sentinel best practices, usage, and administration.

Create documentation for configurations, processes, and troubleshooting procedures.

Skills, Experience, & Capabilities:

Offeror shall propose resource(s) possessing the following mid to expert level preferred skills, experience, and capabilities:

Recent experience with the administration and management of Microsoft Sentinel.   

Experience developing, compiling, and executing KQL queries. 

Strong aptitude to learn platforms, to work with stakeholders, to understand and provide thoughts on how to customize and maintain platforms to meet organizational business needs.

Experience generating playbooks and using Azure logic apps for security orchestration, automation and response.

Experience in querying, reviewing and providing contextual information from log data. 

P
roficient in the use of M365 Office suite of tool.

Ability to establish and maintain effective working relationships with peers, end users and vendor development staff, as well as all levels of management and judicial personnel as necessary.

Ability to communicate clearly and lead technical discussions related to log data management and knowledge sharing.

Thanks,

PRATIIK DESHMUUKH

TECHNICAL RECRUITER

Mail:
 [email protected], www.technixonline.com

Direct: 480-389-2903

Phoenix, AZ, 85050

Technix LLC |
Phoenix, AZ
|
phoenix, AZ 85050 US

|

Update Profile
|

Constant Contact Data Notice

Keywords: business analyst information technology Arizona
Remote Position || SIEM Engineer || State of MD
[email protected]
[email protected]
View all
Tue Jul 09 19:07:00 UTC 2024

To remove this job post send "job_kill 1542979" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 14

Location: Annapolis, Maryland