Deloitte - Delhi, OH

posted 16 days ago

Full-time - Mid Level
Delhi, OH
Professional, Scientific, and Technical Services

About the position

Deloitte presents an opportunity to unleash and realise your potential amongst cutting edge leaders, and organisations shaping the future of the region, and indeed, the world beyond. As a Consultant in our Cyber Team, you'll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations. We are looking for a skilled and proactive LogRhythm L1 Engineer to join our Security Operations team. As a Level 2 Engineer, you will be responsible for advanced analysis, troubleshooting, and remediation of security incidents and events using the LogRhythm SIEM platform. You will work closely with other security professionals to identify and respond to potential security threats, refine detection mechanisms, and optimize security monitoring tools to ensure the highest level of security for the organization.

Responsibilities

  • Conduct deeper analysis of security events and alerts generated by LogRhythm, correlating data across various sources to identify potential security threats.
  • Perform advanced triage, classification, and root cause analysis of escalated security incidents.
  • Utilize the LogRhythm SIEM platform to investigate complex security events, identifying patterns and relationships in logs to identify potential malicious activities.
  • Take ownership of high-priority and complex security incidents, working closely with the Level 1 team to provide expertise and guidance.
  • Engage with incident response teams to perform deeper forensic analysis and assist with the containment, mitigation, and recovery phases of security incidents.
  • Document and communicate incident findings, ensuring a clear and concise record of the investigation and resolution process.
  • Manage and optimize the LogRhythm SIEM platform to ensure data collection, parsing, and normalization are functioning effectively.
  • Develop and fine-tune correlation rules, detection use cases, and custom reports to improve detection capabilities and reduce false positives.
  • Provide recommendations for system enhancements and adjustments based on findings from incidents or emerging threats.
  • Integrate and manage threat intelligence feeds within LogRhythm to enhance detection capabilities.
  • Analyze and correlate threat intelligence data with internal security logs to identify external and internal threats in real-time.
  • Configure and tune security tools (firewalls, endpoint detection and response (EDR), intrusion detection/prevention systems (IDS/IPS)) to optimize integration with the LogRhythm platform.
  • Collaborate with the L1 team, senior engineers, and other stakeholders in the security operations lifecycle to ensure smooth and effective incident handling.
  • Provide mentoring and training to junior engineers and analysts in best practices for incident response and SIEM platform usage.
  • Assist in generating reports for security incident analysis, compliance audits, and management reviews.
  • Support internal and external audits, providing data, logs, and documentation as needed.
  • Help track security metrics and performance indicators to support security operations reporting.
  • Stay updated on the latest trends in cybersecurity threats, vulnerabilities, and defense mechanisms to enhance the team's capabilities.

Requirements

  • Advanced proficiency with LogRhythm SIEM platform (experience with other SIEM platforms like Splunk, QRadar, or ArcSight is a plus).
  • In-depth understanding of network protocols (TCP/IP, DNS, HTTP, etc.), security devices (firewalls, IDS/IPS, etc.), and endpoint security technologies (EDR, antivirus, etc.).
  • Hands-on experience with log analysis, data correlation, and incident investigation.
  • Familiarity with threat intelligence tools, data sources, and feeds.
  • Strong understanding of security frameworks, including MITRE ATT&CK, NIST, and OWASP.

Nice-to-haves

  • Bachelor's degree in Computer Science, Cybersecurity, or related field, or equivalent experience.
  • Minimum of 4-7 years of experience in cybersecurity, IT security operations, or incident response.
  • Prior experience in a Security Operations Center (SOC) or handling security incidents in an enterprise environment.
  • Experience with security monitoring, SIEM platform tuning, and threat detection engineering.

Benefits

  • Professional development opportunities
  • Inclusive work environment
  • Flexible work arrangements
  • Health and wellness programs
  • Career growth and mentorship programs
Job Description Matching

Match and compare your resume to any job description

Start Matching
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service