LogRythm Engineer

2 - 6 years

5 - 15 Lacs

gurugram delhi / ncr

Posted:2 days ago| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

Your work profile.

We are looking for a skilled and proactive LogRhythm L1 Engineer to join our Security Operations team. As a

Level 1 Engineer, you will be responsible for advanced analysis, troubleshooting, and remediation of security

incidents and events using the LogRhythm SIEM platform. You will work closely with other security

professionals to identify and respond to potential security threats, refine detection mechanisms, and optimize

security monitoring tools to ensure the highest level of security for the organization.

Key Responsibilities:

Advanced Log Monitoring and Analysis:

  • Conduct deeper analysis of security events and alerts generated by LogRhythm, correlating data across

various sources to identify potential security threats.

  • Perform advanced triage, classification, and root cause analysis of escalated security incidents.
  • Utilize the LogRhythm SIEM platform to investigate complex security events, identifying patterns and

relationships in logs to identify potential malicious activities.

Incident Escalation and Resolution:

  • Take ownership of high-priority and complex security incidents, working closely with the Level 1 team to

provide expertise and guidance.

  • Engage with incident response teams to perform deeper forensic analysis and assist with the

containment, mitigation, and recovery phases of security incidents.

  • Document and communicate incident findings, ensuring a clear and concise record of the investigation

and resolution process.

LogRhythm Platform Management:

Manage and optimize the LogRhythm SIEM platform to ensure data collection, parsing, and

normalization are functioning effectively.

  • Develop and fine-tune correlation rules, detection use cases, and custom reports to improve detection

capabilities and reduce false positives.

  • Provide recommendations for system enhancements and adjustments based on findings from incidents

or emerging threats.

Threat Intelligence Integration:

  • Integrate and manage threat intelligence feeds within LogRhythm to enhance detection capabilities.
  • Analyse and correlate threat intelligence data with internal security logs to identify external and internal

threats in real-time.

Security Tool Configuration and Tuning:

  • Configure and tune security tools (firewalls, endpoint detection and response (EDR), intrusion

detection/prevention systems (IDS/IPS)) to optimize integration with the LogRhythm platform.

  • Work with the team to enhance detection rules and improve threat coverage based on new attack

techniques and tactics (e.g., MITRE ATT&CK framework).

Collaboration and Knowledge Sharing:

  • Collaborate with the L1 team, senior engineers, and other stakeholders in the security operations

lifecycle to ensure smooth and effective incident handling.

  • Provide mentoring and training to junior engineers and analysts in best practices for incident response

and SIEM platform usage.

  • Participate in security operations meetings, helping to continuously refine and improve processes.

Reporting and Compliance:

  • Assist in generating reports for security incident analysis, compliance audits, and management reviews.
  • Support internal and external audits, providing data, logs, and documentation as needed.
  • Help track security metrics and performance indicators to support security operations reporting.

Continuous Improvement and Research:

  • Stay updated on the latest trends in cybersecurity threats, vulnerabilities, and defense mechanisms to

enhance the teams capabilities.

  • Suggest improvements to the security monitoring processes and help implement new detection

technologies and methodologies.

Desired qualifications.

Technical Skills:

  • Advanced proficiency with LogRhythm SIEM platform (experience with other SIEM platforms like Splunk,

QRadar, or ArcSight is a plus).

  • In-depth understanding of network protocols (TCP/IP, DNS, HTTP, etc.), security devices (firewalls,

IDS/IPS, etc.), and endpoint security technologies (EDR, antivirus, etc.).

  • Hands-on experience with log analysis, data correlation, and incident investigation.
  • Familiarity with threat intelligence tools, data sources, and feeds.
  • Strong understanding of security frameworks, including MITRE ATT&CK, NIST, and OWASP.

  • Experience:
  • • Minimum of 26 years of experience in cybersecurity, IT security operations, or incident response.
  • • Prior experience in a Security Operations Center (SOC) or handling security incidents in an enterprise
  • environment.
  • • Experience with security monitoring, SIEM platform tuning, and threat detection engineering.
  • Soft Skills:
  • • Strong analytical, problem-solving, and troubleshooting skills.
  • • Excellent communication skills, with the ability to clearly explain complex technical concepts to both
  • technical and non-technical stakeholders.
  • • Ability to work well under pressure and in a fast-paced environment, managing multiple tasks effectively.

NP-Immediate to 60 Days

Apply relevant candidates only

Walk in drive on 1st Nov'25

No C2H(Contract) or Third party Candidates only permanent Candidates

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now
Clarity Consulting logo
Clarity Consulting

Consulting

Chicago

RecommendedJobs for You