drjobs Job Description: Security Operations Specialist – SIEM & SOAR

Job Description: Security Operations Specialist – SIEM & SOAR

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Bengaluru - India

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

At Iron Mountain we know that work when done well makes a positive impact for our customers our employees and our planet. Thats why we need smart committed people to join us. Whether youre looking to start your career or make a change talk to us and see how you can elevate the power of your work at Iron Mountain.

We provide expert sustainable solutions in records and information management digital transformation services data centers asset lifecycle management and fine art storage handling and logistics. We proudly partner every day with our 225000 customers around the world to preserve their invaluable artifacts extract more from their inventory and protect their data privacy in innovative and socially responsible ways.

Are you curious about being part of our growth story while evolving your skills in a culture that will welcome your unique contributions If so lets start the conversation.

Job Description: Security Operations Specialist SIEM & SOAR

Location: Remote India

Job Type: FullTime

Department: Information Security / Security Operations

Job Summary

We are seeking a Security Operations Specialist SIEM & SOAR to manage and optimize Security Information and Event Management (SIEM) and Security Orchestration Automation and Response (SOAR) platforms. The ideal candidate will oversee the operation of Splunk Google Chronicle Siemplify and Palo Alto XSOAR ensuring effective log ingestion parser development playbook automation and anomaly detection. This role is critical in identifying unusual behavior enhancing security visibility and providing actionable insights to executives.

Key Responsibilities

1. SIEM Operations & Log Management

  • Manage and maintain SIEM platforms (Splunk Google Chronicle) to ensure optimal log ingestion and processing.

  • Develop and finetune log parsers for structured and unstructured data.

  • Ensure data normalization enrichment and correlation to improve threat detection.

2. Threat Detection & Anomaly Analysis

  • Continuously monitor security events to identify unusual behavior and potential threats.

  • Create custom detections alerts and dashboards for advanced threat visibility.

  • Investigate suspicious activities and escalate incidents as needed.

3. SOAR Automation & Playbook Development

  • Design and implement automation playbooks in Siemplify and Palo Alto XSOAR to streamline security operations.

  • Automate threat response triage and remediation workflows to reduce response times.

  • Integrate SIEM threat intelligence feeds and incident response tools for enhanced security operations.

4. Security Insights & Executive Reporting

  • Generate security analytics and reports for leadership highlighting trends and risks.

  • Provide executivelevel insights on security events response effectiveness and operational improvements.

  • Track and improve key security metrics and operational efficiencies.

Qualifications & Skills

Required:

  • 3 years of experience in SIEM SOAR or Security Operations.

  • Handson experience with Splunk Google Chronicle Siemplify Palo Alto XSOAR.

  • Strong knowledge of log ingestion parsing and security event correlation.

  • Experience in developing custom detections queries and dashboards.

  • Ability to design and automate security playbooks for incident response.

  • Strong analytical and communication skills to present security insights to executives.

Preferred:

  • Certifications such as Splunk Certified Admin Chronicle Security Engineer CISSP or GIAC Security Operations (GCIA GMON).

  • Experience with threat intelligence integration and UEBA (User and Entity Behavior Analytics).

  • Knowledge of cloud security logging (AWS GCP Azure) and compliance frameworks.

Category: Information Technology


Required Experience:

Unclear Seniority

Employment Type

Full-Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.