Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailAt Iron Mountain we know that work when done well makes a positive impact for our customers our employees and our planet. Thats why we need smart committed people to join us. Whether youre looking to start your career or make a change talk to us and see how you can elevate the power of your work at Iron Mountain.
We provide expert sustainable solutions in records and information management digital transformation services data centers asset lifecycle management and fine art storage handling and logistics. We proudly partner every day with our 225000 customers around the world to preserve their invaluable artifacts extract more from their inventory and protect their data privacy in innovative and socially responsible ways.
Are you curious about being part of our growth story while evolving your skills in a culture that will welcome your unique contributions If so lets start the conversation.
Location: Remote India
Job Type: FullTime
Department: Information Security / Security Operations
We are seeking a Security Operations Specialist SIEM & SOAR to manage and optimize Security Information and Event Management (SIEM) and Security Orchestration Automation and Response (SOAR) platforms. The ideal candidate will oversee the operation of Splunk Google Chronicle Siemplify and Palo Alto XSOAR ensuring effective log ingestion parser development playbook automation and anomaly detection. This role is critical in identifying unusual behavior enhancing security visibility and providing actionable insights to executives.
Manage and maintain SIEM platforms (Splunk Google Chronicle) to ensure optimal log ingestion and processing.
Develop and finetune log parsers for structured and unstructured data.
Ensure data normalization enrichment and correlation to improve threat detection.
Continuously monitor security events to identify unusual behavior and potential threats.
Create custom detections alerts and dashboards for advanced threat visibility.
Investigate suspicious activities and escalate incidents as needed.
Design and implement automation playbooks in Siemplify and Palo Alto XSOAR to streamline security operations.
Automate threat response triage and remediation workflows to reduce response times.
Integrate SIEM threat intelligence feeds and incident response tools for enhanced security operations.
Generate security analytics and reports for leadership highlighting trends and risks.
Provide executivelevel insights on security events response effectiveness and operational improvements.
Track and improve key security metrics and operational efficiencies.
3 years of experience in SIEM SOAR or Security Operations.
Handson experience with Splunk Google Chronicle Siemplify Palo Alto XSOAR.
Strong knowledge of log ingestion parsing and security event correlation.
Experience in developing custom detections queries and dashboards.
Ability to design and automate security playbooks for incident response.
Strong analytical and communication skills to present security insights to executives.
Certifications such as Splunk Certified Admin Chronicle Security Engineer CISSP or GIAC Security Operations (GCIA GMON).
Experience with threat intelligence integration and UEBA (User and Entity Behavior Analytics).
Knowledge of cloud security logging (AWS GCP Azure) and compliance frameworks.
Required Experience:
Unclear Seniority
Full-Time