SIEM Analyst & Admin Roles and Responsibilities:
- Fine-tuning SIEM LogRhythm use cases to reduce false positive and remove false negatives.
- Integrate systems and Log Source Onboarding: (Windows and Linux servers, Network Devices, Database. etc).
- Perform analysis and response to incidents and SIEM LogRhythm Alarms.
- Ensuring the overall health of SIEM LogRhythm system and log sources.
- Should be thorough in Troubleshooting SIEM LogRhythm system and collector issue.
- Continuous maintenance of the system as well as any other.
- Creating and developing Use cases.
- Generating SIEM weekly/Monthly reports for management team.
- Investigate and monitor security logs that generated from different log sources.
- Identify, categorize, prioritize, and investigate correlated events.
- Perform investigation and triage of events and incidents and escalate according to SOPs.
- Responsible for working in an 8x5 Security Operation centre (SOC) environment and during extended working hours whenever needed.
- Incidents analysis and investigation to determine their severity and response as required by SLAs & KPIs.
- Document investigation results and provide relevant details for final analysis.
- Analyse and investigate security incidents and alerts to determine the root case, impact, and severity.
- Response to security incidents and alerts by identifying and containing the threat and vulnerability.
- Conduct vulnerabilities Assessment identified by infrastructure scan and provided Mitigation plan.
- Send and receive notifications to the respective teams regarding vulnerabilities to take necessary actions.
- Provide vulnerability assessment reports for management.
- Develop reports, dashboards, real-time rules, filters, and active channels.
- Detect network potential threats and create use cases to mitigate the risk from SOC team.
- Document cyber-Incidents and implement incident response plan and process.
- Ability to create and develop SIEM Dashboards.
Experience and Qualification:
- Bachelor’s degree of computer science, Cybersecurity, Information Technology, anything related.
- Minimum 5+ years’ experience in LogRhythm SIEM Administration and Management.
- Minimum 5+ years’ experience as Soc Analyst for LogRhythm SIEM Tool.
- Professional experience in incident detection and response, malware analysis.
- Deep understanding of Attacks frameworks and techniques like: MITRE ATT&CK.
- Experience with developing standard operating procedures and incident response plan.
- Experience with log analysis from various formats.
- Experience in security incident management and vulnerability management process.