Palo Alto Networks - Santa Clara, CA

posted about 2 months ago

Full-time - Mid Level
Santa Clara, CA
Professional, Scientific, and Technical Services

About the position

In this role, you will be responsible for executing security-related data engineering programs and managing data management & SIEM platforms. You will work very closely with the SOC and cross-functional teams to manage and develop tools and infrastructure that enable the Information Security team to prevent, detect, contain, and manage risks within the Palo Alto Networks Enterprise environment. You will have an extensive background in managing and engineering SIEM solutions within an enterprise environment; including design, implementation, and maintenance of all aspects of our SIEMs and its components. This is a fast-paced, post-startup environment. Successful candidates will be customer-oriented, results-driven and passionate about building great products that will impact across the organization. Your responsibilities will include implementing and managing log collection and storage solutions across various platforms, ensuring logs are collected, parsed, and stored securely while complying with industry regulations and organizational policies. You will also review and optimize log retention policies and storage solutions to balance performance and compliance. Additionally, you will design, deploy, and maintain the organization's SIEM platforms to ensure effective monitoring and detection of potential security threats. This includes developing and fine-tuning SIEM rules, alerts, and dashboards to detect suspicious activities and reduce false positives. You will analyze log and event data from multiple sources to identify patterns, anomalies, and potential security incidents, performing threat hunting by proactively searching for signs of compromise or malicious activity in log data. Collaboration with the incident response team will be crucial as you investigate and mitigate security incidents, providing insights derived from log and SIEM data. Furthermore, you will work closely with IT, DevOps, and other security teams to ensure continuous improvement of security monitoring capabilities, mentoring junior analysts and conducting training sessions on SIEM best practices and incident detection strategies. Compliance with relevant industry standards and regulations concerning log management and data retention will also be part of your responsibilities, along with maintaining comprehensive documentation for all log management and SIEM configurations, processes, and procedures.

Responsibilities

  • Implement and manage log collection and storage solutions across various platforms, including servers, applications, and cloud services.
  • Ensure logs are collected, parsed, and stored securely and complying with industry regulations and organizational policies.
  • Review and optimize log retention policies and storage solutions to balance performance and compliance.
  • Design, deploy, and maintain the organization's SIEM platforms to ensure it effectively monitors and detects potential security threats.
  • Develop and fine-tune SIEM rules, alerts, and dashboards to detect suspicious activities and reduce false positives.
  • Integrate new data sources into the SIEM platform and ensure all relevant security data is captured and analyzed.
  • Analyze log and event data from multiple sources to identify patterns, anomalies, and potential security incidents.
  • Perform threat hunting by proactively searching for signs of compromise or malicious activity in log data.
  • Generate reports and dashboards to communicate findings to technical and non-technical stakeholders, including senior management.
  • Collaborate with the incident response team to investigate and mitigate security incidents, providing insights derived from log and SIEM data.
  • Provide recommendations for improvements based on incident analysis and lessons learned.
  • Work closely with IT, DevOps, and other security teams to ensure the continuous improvement of security monitoring capabilities.
  • Mentor junior analysts on log management, SIEM operations, and data analysis techniques.
  • Conduct training sessions on SIEM best practices and incident detection strategies.
  • Ensure compliance with relevant industry standards and regulations (e.g., GDPR, HIPAA, PCI-DSS) concerning log management and data retention.
  • Maintain comprehensive documentation for all log management, SIEM configurations, processes, and procedures.

Requirements

  • Bachelor's degree in Information Security, Computer Science, Data Analytics, or a related field, or equivalent work experience or equivalent military experience required.
  • 3+ years of experience in log management, SIEM engineering, and/or data analysis in a security context.
  • Experience with popular SIEM platforms such as Splunk, IBM QRadar, ArcSight, or ELK/Elastic Stack.
  • Strong understanding of log management principles, including log collection, parsing, storage, and analysis.
  • Proficiency in SIEM configuration, rule creation, and alert tuning.
  • Solid knowledge of cybersecurity concepts, including threat detection, incident response, and vulnerability management.
  • Experience with scripting languages (e.g., Python, PowerShell) for data analysis and automation.
  • Familiarity with regulatory requirements and standards (e.g., FedRAMP, MLPS, NIST, PCI) related to data retention and security monitoring.
  • Excellent problem-solving skills and attention to detail.
  • Strong communication skills, with the ability to present complex technical information to non-technical audiences.

Benefits

  • FLEXBenefits wellbeing spending account with over 1,000 eligible items selected by employees.
  • Mental and financial health resources.
  • Personalized learning opportunities.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service