Title: CrowdStrike SIEM Network Security Engineer
Duration: 4 Months (3 Years Ext)
Location: 100% Remote Work Location With-in the anywhere in Texas
Summary:
This project will optimize the agencys CrowdStrike SIEM and related CrowdStrike services to improve threat detection monitoring and response capabilities. The contractor will expand and tune telemetry integrate additional high value log sources enhance security dashboards and support the rollout of additional CrowdStrike services. The effort will increase visibility into endpoint and security risk improve signal quality and correlation and provide security leadership with clear insight into security operations effectiveness and overall risk posture.
Expected Outcomes:
Expanded and optimized CrowdStrike SIEM telemetry coverage
Integration of additional high value log sources
Improved dashboards for operational and executive visibility
Enhanced detection fidelity and monitoring effectiveness
Clearer insight for leadership into endpoint risk and security operations performance
Duties to Be Performed:
Assess current CrowdStrike SIEM configuration telemetry coverage and log ingestion
Enable and tune additional CrowdStrike telemetry to improve visibility and signal quality
Identify and integrate new high value log sources into CrowdStrike SIEM
Develop and refine security dashboards aligned to SOC and executive use cases
Assist with technical enablement and rollout of additional CrowdStrike services
Validate data quality parsing and correlation within the SIEM
Coordinate with Security Operations IT Operations and system owners
Identify gaps risks and improvement opportunities in monitoring and detection
Provide weekly status updates and monthly executive level progress summaries
Deliver supporting documentation and recommendations to sustain improvements
Deliverables:
Summary of work performed and capabilities delivered
Documentation supporting all telemetry enablement log integrations and dashboard implementations
Measurable improvements in monitoring detection or visibility
Recommendations for future enhancements or next-phase efforts
Required Skills:
8 Years of Required Demonstrated skill with documentation reporting and knowledge transfer
8 Years of Required Experience with Stakeholder Engagement and Executive Communication
8 Years of Required Experience in SIEM Detection Engineering and Alert Optimization
8 Years of Required Experience in Log Source Integration and Data Normalization
3 Years of Required Hands-On Experience with CrowdStrike SIEM and Dashboard Development
Preferred Skills:
5 Years of Preferred Hands-On Experience with SIEM and Dashboard Development
Title: CrowdStrike SIEM Network Security Engineer Duration: 4 Months (3 Years Ext) Location: 100% Remote Work Location With-in the anywhere in Texas Summary: This project will optimize the agencys CrowdStrike SIEM and related CrowdStrike services to improve threat detection monitoring and response ...
Title: CrowdStrike SIEM Network Security Engineer
Duration: 4 Months (3 Years Ext)
Location: 100% Remote Work Location With-in the anywhere in Texas
Summary:
This project will optimize the agencys CrowdStrike SIEM and related CrowdStrike services to improve threat detection monitoring and response capabilities. The contractor will expand and tune telemetry integrate additional high value log sources enhance security dashboards and support the rollout of additional CrowdStrike services. The effort will increase visibility into endpoint and security risk improve signal quality and correlation and provide security leadership with clear insight into security operations effectiveness and overall risk posture.
Expected Outcomes:
Expanded and optimized CrowdStrike SIEM telemetry coverage
Integration of additional high value log sources
Improved dashboards for operational and executive visibility
Enhanced detection fidelity and monitoring effectiveness
Clearer insight for leadership into endpoint risk and security operations performance
Duties to Be Performed:
Assess current CrowdStrike SIEM configuration telemetry coverage and log ingestion
Enable and tune additional CrowdStrike telemetry to improve visibility and signal quality
Identify and integrate new high value log sources into CrowdStrike SIEM
Develop and refine security dashboards aligned to SOC and executive use cases
Assist with technical enablement and rollout of additional CrowdStrike services
Validate data quality parsing and correlation within the SIEM
Coordinate with Security Operations IT Operations and system owners
Identify gaps risks and improvement opportunities in monitoring and detection
Provide weekly status updates and monthly executive level progress summaries
Deliver supporting documentation and recommendations to sustain improvements
Deliverables:
Summary of work performed and capabilities delivered
Documentation supporting all telemetry enablement log integrations and dashboard implementations
Measurable improvements in monitoring detection or visibility
Recommendations for future enhancements or next-phase efforts
Required Skills:
8 Years of Required Demonstrated skill with documentation reporting and knowledge transfer
8 Years of Required Experience with Stakeholder Engagement and Executive Communication
8 Years of Required Experience in SIEM Detection Engineering and Alert Optimization
8 Years of Required Experience in Log Source Integration and Data Normalization
3 Years of Required Hands-On Experience with CrowdStrike SIEM and Dashboard Development
Preferred Skills:
5 Years of Preferred Hands-On Experience with SIEM and Dashboard Development
View more
View less