Summary: As a Security Engineer, you will be responsible for designing, building, and protecting enterprise systems, applications, data, assets, and people. Your typical day will involve applying security skills to safeguard information, infrastructures, applications, and business processes against cyber threats using Security Information & Event Management (SIEM) Platform Operations. Roles & Responsibilities: Lead the implementation and maintenance of SIEM platforms to able to detect and respond to security incidentsCollaborate with cross-functional teams to develop and implement security usecases, playbooks, and integrationsStay updated with the latest advancements in security technologies and best practices to ensure the security of enterprise systems and dataCreate/Modify SIEM/SOAR usecases, playbooks, dashboards and parsersLead SIEM/SOAR build/implementation activitiesProvide recommendations and optimizations on SIEM and SOAR technologies to drive efficiencies and increase output Professional & Technical Skills: Experience in Security Response and Monitoring Implemented any SIEM solutions;Hands on experience in port scan and vulnerability scanning techniques;Strong ArcSight ESM and Splunk skills from end tend understanding of the technology;Strong understanding of Security orchestration, automation and response technology; Implemented multiple SOAR playbooks/projects;Strong understanding of Correlation, Normalization, Parsing, and syslog formats and events in general;Strong understanding of SIEM and the required infrastructure;Strong understanding of SIEM concepts and best practices;Should have architect level knowledge in Information Security domain;Should have design, build or consulting experience on any of the leading SMR tools;Knowledge on different standards and frameworks CIS, COBIT, IS17799 27001, NIST SP800-53, ITIL v2, HIPAA, FFIEC, NERC-CIP, PCI-DSS, CIS, OWASP Windows administration skillsApplication servers, web services, remote access, file print services, server virtualizationActive Directory Performance monitoring, logs alerts Network fundamentalsKnowledgeable in Infrastructures such as VPN, LAN, WAN, wireless network, network topologies, and access methodsKnowledgeable in Hardware such as switches, routers, media typesProtocols and services such as OSI model, IPv4, IPv6, name resolutions, networking services, TCP/IPKnowledgeable in User authentication, permissions, password policies, audit policies, encryption, cryptographyKnowledgeable in Physical security, internet security, wireless security, and core security principlesStrong understanding to security monitoring tools and technologies Splunk, SIEM, IBM QRadar, Demisto, Splunk Phantom, Azure Sentinel Additional Information: The ideal candidate will possess a strong educational background in computer science, information technology, or a related field, along with a proven track record of delivering impactful security solutions