Jobs
Interviews

2 Siem Admin Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 10.0 years

20 - 30 Lacs

Hyderabad

Remote

Job description Job Role : SentinelOne Migration Engineer /SIEM Engineer--Work From Home Experience : 5 to 11 Yrs Key Skills: SIEM Administration, SIEM Implementation, SIEM Migration, Integration Notice Period : 0 to 30 days Mode of Work : Remote( 06:00 PM to 03:00 AM IST) Should be willing to work in Second shift Company: Cyber Towers, Quadrant 3, 3rd floor, Madhapur, Hyderabad -- 500081. Job Overview: We are seeking a talented and highly motivated SentinelOne Migration SIEM Engineer to join our Dedicated Defense group. As a key member of our team, you will be responsible for deploying and maintaining SentinelOne's AI SIEM to enhance threat detection, response, and overall security posture. This is an exciting opportunity for an individual with expertise in SIEM technologies, aiming to help safeguard critical systems and data from evolving cyber threats. Responsibilities: Integration & Optimization: Integrate and optimize SentinelOne AI SIEM to improve visibility and automate threat detection workflows. Threat Detection: Utilize SentinelOnes AI-powered analytics to dashboard reports and automate critical reporting functions Automation & Playbook Development: Develop automated detection and response playbooks based on SentinelOne data feeds, streamlining incident management and reducing time to resolution. Collaboration & Knowledge Sharing: Work closely with other security and IT teams to share threat intelligence, optimize SIEM use, and contribute to security strategy development. Reporting & Documentation: Develop and maintain dashboards, reports, and documentation related to SentinelOne deployment, performance, and incident metrics. Continuous Improvement: Continuously evaluate SentinelOne's capabilities and other relevant security tools to recommend improvements and refine detection capabilities. Required Qualifications: Bachelors degree in Computer Science, Information Security, or a related field (or equivalent experience). 1+ year of experience working with SentinelOne AI SIEM Hands-on experience with other SIEM platforms (Splunk, IBM QRadar, Microsoft Sentinel, etc.) and integrating them with endpoint security tools. Strong understanding of cybersecurity principles, threat detection, and SIEM management. Proficiency in scripting and automation (Python, PowerShell, etc.). Experience with cloud security (AWS, Azure, GCP) and cloud-native SIEM solutions is a plus. Preferred Qualifications: SentinelOne certification (or equivalent industry certifications). Knowledge of compliance frameworks (e.g., NIST, ISO 27001, GDPR, etc.) and how they apply to security operations. Key Skills: Technical Skills: SentinelOne platform, SIEM tools, security automation, machine learning for cybersecurity, network security. Analytical Skills: Strong ability to analyze large datasets and correlate logs/events. Communication Skills: Excellent verbal and written communication skills for collaborating with cross-functional teams and providing clear reporting. Problem-Solving: Strong troubleshooting skills with the ability to resolve complex security issues quickly and effectively.

Posted 3 months ago

Apply

4.0 - 7.0 years

12 - 22 Lacs

bengaluru, delhi / ncr, mumbai (all areas)

Work from Office

About the Role: We are seeking a highly skilled Detection Engineering Specialist to lead the migration and optimization of our detection logic and alerting infrastructure to a new SIEM platform. This role is critical to ensuring the integrity, performance, and effectiveness of our security monitoring capabilities during and after the transition. Key Responsibilities: Audit and document existing detection rules, use cases, and alert logic from the legacy SIEM. Rebuild or refactor detection rules using the native query language and capabilities of the new SIEM platform. Validate detection efficacy through rigorous testing and tuning. Ensure alert workflows, playbooks, and escalation paths are preserved or enhanced in the new environment. Collaborate with Incident Response (IR) teams to test and refine end-to-end alert triage and response processes. Integrate SOAR tools or automation pipelines to streamline detection and response. Map legacy SIEM data sources and detection logic to the new platforms architecture. Coordinate phased migration of log sources and detection content with minimal disruption. Monitor for gaps or failures in detection coverage during and after migration. Work closely with SOC, IR, and platform engineering teams to align detection strategies with operational needs. Maintain clear and comprehensive documentation of detection logic, migration steps, and validation results. Qualifications: Proven experience with SIEM platforms (e.g., Splunk, Sentinel, QRadar, Elastic, etc.). Strong proficiency in detection engineering, including rule development and tuning. Familiarity with SOAR platforms and automation workflows. Experience in security operations, incident response, or threat detection. Excellent collaboration and communication skills. Strong documentation and process-tracking abilities. Preferred: Experience with large-scale SIEM migrations. Knowledge of MITRE ATT&CK framework and threat modeling. Scripting or automation experience (e.g., Python, PowerShell).

Posted Date not available

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies