Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 - 10.0 years
20 - 30 Lacs
Hyderabad
Remote
Job description Job Role : SentinelOne Migration Engineer /SIEM Engineer--Work From Home Experience : 5 to 11 Yrs Key Skills: SIEM Administration, SIEM Implementation, SIEM Migration, Integration Notice Period : 0 to 30 days Mode of Work : Remote( 06:00 PM to 03:00 AM IST) Should be willing to work in Second shift Company: Cyber Towers, Quadrant 3, 3rd floor, Madhapur, Hyderabad -- 500081. Job Overview: We are seeking a talented and highly motivated SentinelOne Migration SIEM Engineer to join our Dedicated Defense group. As a key member of our team, you will be responsible for deploying and maintaining SentinelOne's AI SIEM to enhance threat detection, response, and overall security posture. This is an exciting opportunity for an individual with expertise in SIEM technologies, aiming to help safeguard critical systems and data from evolving cyber threats. Responsibilities: Integration & Optimization: Integrate and optimize SentinelOne AI SIEM to improve visibility and automate threat detection workflows. Threat Detection: Utilize SentinelOnes AI-powered analytics to dashboard reports and automate critical reporting functions Automation & Playbook Development: Develop automated detection and response playbooks based on SentinelOne data feeds, streamlining incident management and reducing time to resolution. Collaboration & Knowledge Sharing: Work closely with other security and IT teams to share threat intelligence, optimize SIEM use, and contribute to security strategy development. Reporting & Documentation: Develop and maintain dashboards, reports, and documentation related to SentinelOne deployment, performance, and incident metrics. Continuous Improvement: Continuously evaluate SentinelOne's capabilities and other relevant security tools to recommend improvements and refine detection capabilities. Required Qualifications: Bachelors degree in Computer Science, Information Security, or a related field (or equivalent experience). 1+ year of experience working with SentinelOne AI SIEM Hands-on experience with other SIEM platforms (Splunk, IBM QRadar, Microsoft Sentinel, etc.) and integrating them with endpoint security tools. Strong understanding of cybersecurity principles, threat detection, and SIEM management. Proficiency in scripting and automation (Python, PowerShell, etc.). Experience with cloud security (AWS, Azure, GCP) and cloud-native SIEM solutions is a plus. Preferred Qualifications: SentinelOne certification (or equivalent industry certifications). Knowledge of compliance frameworks (e.g., NIST, ISO 27001, GDPR, etc.) and how they apply to security operations. Key Skills: Technical Skills: SentinelOne platform, SIEM tools, security automation, machine learning for cybersecurity, network security. Analytical Skills: Strong ability to analyze large datasets and correlate logs/events. Communication Skills: Excellent verbal and written communication skills for collaborating with cross-functional teams and providing clear reporting. Problem-Solving: Strong troubleshooting skills with the ability to resolve complex security issues quickly and effectively.
Posted 3 months ago
4.0 - 7.0 years
12 - 22 Lacs
bengaluru, delhi / ncr, mumbai (all areas)
Work from Office
About the Role: We are seeking a highly skilled Detection Engineering Specialist to lead the migration and optimization of our detection logic and alerting infrastructure to a new SIEM platform. This role is critical to ensuring the integrity, performance, and effectiveness of our security monitoring capabilities during and after the transition. Key Responsibilities: Audit and document existing detection rules, use cases, and alert logic from the legacy SIEM. Rebuild or refactor detection rules using the native query language and capabilities of the new SIEM platform. Validate detection efficacy through rigorous testing and tuning. Ensure alert workflows, playbooks, and escalation paths are preserved or enhanced in the new environment. Collaborate with Incident Response (IR) teams to test and refine end-to-end alert triage and response processes. Integrate SOAR tools or automation pipelines to streamline detection and response. Map legacy SIEM data sources and detection logic to the new platforms architecture. Coordinate phased migration of log sources and detection content with minimal disruption. Monitor for gaps or failures in detection coverage during and after migration. Work closely with SOC, IR, and platform engineering teams to align detection strategies with operational needs. Maintain clear and comprehensive documentation of detection logic, migration steps, and validation results. Qualifications: Proven experience with SIEM platforms (e.g., Splunk, Sentinel, QRadar, Elastic, etc.). Strong proficiency in detection engineering, including rule development and tuning. Familiarity with SOAR platforms and automation workflows. Experience in security operations, incident response, or threat detection. Excellent collaboration and communication skills. Strong documentation and process-tracking abilities. Preferred: Experience with large-scale SIEM migrations. Knowledge of MITRE ATT&CK framework and threat modeling. Scripting or automation experience (e.g., Python, PowerShell).
Posted Date not available
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |