We are looking for a SIEM Analyst on a 12 months extendable contract role.
The Real-Time Security Event Correlation team within Cyber Security Operations organization provides automated monitoring and notification of security events. By partnering with stakeholder teams, they develop and maintain use cases through the enrichment and correlation of security events in a SIEM (Security Information and Event Management) platform. They also manage and develop a case management and workflow application used by analyst teams and bank employees to triage and respond to cases created by the SIEM.
In this role, your primary responsibility will be to work within the SIEM platform to develop new use case detections and support existing production use cases. This will involve working directly with security teams across the Global Information Security department as well as the application teams to elicit requirements and to interface with the technology team which administers Splunk. You will also be joining the team as we are migrating to Splunk from another SIEM application and look to start our next phase of SIEM modernization.
Required Skills:
·Strong working knowledge of the Splunk Platform and its Search Processing Language
·Experience in log parsing, lookups, field transforms/extractions using regular expressions
·Experience writing and tuning detections
·Creative problem-solving and the ability to tackle unique, complex projects
·Demonstrated commitment to training, self-study and maintaining proficiency in the technical cyber security domain
·Ability to work in a fast-paced environment where business needs/priorities may change
·Self-driven, collaborative, and able to work with minimal oversight
·Ability to navigate and work effectively across a complex, geographically dispersed organization
Desired Skills:
·A broad knowledge of information security principles
·Experience with other SIEM solutions
·Experience with CI/CD technologies
Argyll Scott Consulting Pte Ltd