.EmpresaNuvit ServiceDescripción de la EmpresaSomos una empresa de Recursos Humanos y nos interesa mostrarles nuestra presentación con los servicios que ofrecemos, como estudios Socioeconómicos, Pruebas Psicometricas, entre otros servicios.EstadoCiudad de MéxicoLocalidadMexicoSalario45000Tipo de ContrataciónTiempo CompletoDescripción de la PlazaInformation Security EngineerThe SIEM Engineer serves in a technical capacity in all aspects of onboarding log sources to the Splunk Enterprise Security. Log Source onboarding includes coordinating security and audit log data ingestion, parsing the data, making it CIM compliant, development, tuning and validation of Use Cases and dashboards. The SIEM is the repository for the collection, storage and correlation event data across the enterprise. This function includes documenting log source onboarding requirements, performing log onboarding configuration and development/validation of security monitoring Use-Cases.Additional functions include analyzing, assessing and documenting system configuration settings against established requirements for commonly used IT platforms. Develop monitoring Use-Cases as required by logging and monitoring ongoing operation. Research, analyze and understand log sources utilized for the purpose of security monitoring, particularly security and networking devices. Develop and provide system configuration and log onboarding requirements to system owners. Collaborate with other teams to document and implement logging and monitoring capabilities to meet established requirements. Support project tracking by maintaining relevant log onboarding metrics and other relevant criteria.Acts as influencer of peers and management. Acts as resource for incident response related activities and collaborates with technical teams for security incident remediation and communication. Allocates and prioritizes security resources efficiently within the organization. Analyzes and implements security solutions to meet customer requirements. Conducts proof of concepts, vendor comparisons and recommend solutions in line with business requirements. Conducts risk assessments to evaluate the effectiveness of existing controls and determine the impact of proposed changes to business processes, applications and systems. Conducts security research on threats and remediation methods. Contributes to strategic planning to evaluate, deploy or update security technologies. Creates process improvement by identifying inefficiencies and solutions for process improvements. Develops and maintains a set of operational and forward-looking security metrics. Guides and confirms that the design has been implemented as per the requirements.Interacts with partners as needed to explain work product, security techniques, methodology and results to ensure appropriate business value. Oversees daily monitoring of security reports to identify issues and follow these issues to resolution