SIEM Use-Case Engineer

Singapore, Singapore

Job Description:

Primarily accountable for overseeing the engineering, development and maintenance / continuous improvement of threat detection use-cases scenarios within the SIEM (Splunk ES). Additionally, involved in the engineering and development of custom rules in the EDR (CrowdStrike) to swiftly detect potential threats attacks. Another responsibility involves creating transparency of existing detection capabilities by mapping them to the MITRE ATT&CK framework.

  • Support in planning and executing regional IT Infrastructure strategy and aligned with company strategy.
  • Proactively create, test and tune new detection use-cases in the SIEM and custom rules in the EDR.
  • Review and enhance existing detection use-cases using e.g., Machine Learning or User & Entity Behavior Analytics (UEBA).
  • Map the detection use-cases to the MITRE ATT&CK framework to determine the SIEM monitoring coverage.
  • Perform regular updates to threat detection engineering playbooks, processes, and documentations.
  • Work closely with the SOC to challenge detection and prevention capabilities.
  • Identify and implement SIEM use-cases that address blind spots.
  • Coordinate with log onboarding team and SIEM architect to validate new log-sources on-boarded for compliancy, improve performance on SIEM backend
  • Collaboration with Service Operations team to address challenges, process fulfillment, documentations etc, and improvement of Service Operations Quality.
  • Provide governance on topic which related to operational stability.

Qualification:

Specific Knowledge

  • Intense knowledge in using Splunk Enterprise Security (ES)
  • Intense knowledge in developing and tuning detection use-cases (Correlation Searches) in Splunk based on Data Models
  • Experience in Machine Learning and Risk Based Monitoring in Splunk is an advantage
  • Ability to analyse and interpret security logs and events to identify potential threats and attack patterns
  • Experience in validating data source compliant using the common interface model (CIM)
  • Experience of setting up and utilize data models in Splunk
  • Deep understanding of cyber security concepts to create detection use-cases targeting various phases of attack lifecycle
  • Understanding of MITRE ATT&CK framework and detections of various tactics and techniques
  • Experience and capable of creating interactive dashboards, alerts, reports in Splunk

Experience:

  • At least 3 years of experience with demonstrable skillsets in SIEM use-case engineering, with over 5 years of experience in cybersecurity.
  • Previous relevant experience working in a security operational role, ideally within a Corporate, Military, or Police environment; engaging with and responding to a diverse array of internal stakeholders, including senior management.
  • Have good emotional intelligence and is a proven team player
  • Rational and calm under pressure
  • Fluency in the English language
  • Effective oral and written communication skills
  • Good timekeeping ability to cope with a tight deadline and achieve operational objectives
  • Self-motivated with the ability to carry out assigned tasks with minimum supervision

SIEM Use-Case Engineer

Job description

SIEM Use-Case Engineer

Personal information
Details