SIEM (Security Information and Event Management) Technical Lead Position Available In Jefferson, Alabama
Tallo's Job Summary:
Job Description
SIEM (Security Information and Event Management) Technical Lead Prism HRC Birmingham, AL Job Details Contract $119,137 – $128,820 a year 1 day ago Qualifications Bachelor of Computer Science Computer science Cloud infrastructure System administration Azure 6 years Management Computer Science IBM Certified Solution Architect – Cloud Pak for Data v4.x CISSP Google Cloud Platform Information security Bash AWS Bachelor’s degree NIST standards Network protocols Splunk Scripting GIAC Certification SIEM Linux Cybersecurity Senior level 4 years Attack Frameworks Python PowerShell Shell Scripting Identity & access management
Full Job Description Position Overview:
We are looking for an experienced and technically skilled SIEM Technical Lead to spearhead our Security Information and Event Management (SIEM) initiatives. The ideal candidate will have deep hands-on expertise in SIEM tools and architecture, and will lead the design, implementation, tuning, and management of the SIEM environment, ensuring advanced threat detection and security event monitoring capabilities are in place. This is a critical role in strengthening the organization’s cyber defense posture.
Key Responsibilities:
Lead the design, deployment, configuration, and maintenance of SIEM platforms (e.g., Splunk, IBM QRadar, ArcSight, LogRhythm, Azure Sentinel, etc.). Act as the technical SME for all things SIEM – from log ingestion and correlation rule development to dashboards and alert tuning. Collaborate with SOC analysts, threat hunters, and incident response teams to define and refine use cases , rules , and correlation logic . Onboard and normalize logs from a variety of sources: firewalls, endpoints, cloud infrastructure, applications, IAM systems, etc. Optimize SIEM performance for real-time event processing, alerting, and threat detection . Maintain the integrity and security of the SIEM platform, ensuring it is protected against unauthorized access and vulnerabilities. Develop custom dashboards, reports, and alerts to meet operational, compliance, and audit requirements. Drive SIEM integrations with other security tools and platforms (SOAR, EDR, threat intel feeds). Lead the troubleshooting and resolution of SIEM-related issues and outages. Mentor and guide junior engineers and analysts on SIEM best practices and architecture. Stay current on emerging threats, vulnerabilities, and SIEM industry trends.
Required Qualifications:
Bachelor’s degree in Computer Science, Information Security, or a related field (or equivalent practical experience). 6-10 years of experience in cybersecurity, with at least 3 years as a SIEM engineer or lead . Strong hands-on experience with one or more enterprise SIEM tools (e.g., Splunk, QRadar, LogRhythm, ArcSight, Sentinel). Proficient in writing search queries, correlation rules, alerts, and custom parsers . Experience with log management, log parsing (regex), normalization , and log ingestion from a variety of IT systems. Familiarity with
MITRE ATT&CK , NIST
, and cybersecurity frameworks . Knowledge of network protocols, system administration (Linux/Windows), cloud platforms (AWS, Azure, GCP), and endpoint security. Understanding of incident response , SOC operations , and threat detection methodologies .
Preferred Qualifications:
Experience with cloud-native SIEM solutions (e.g., Azure Sentinel, Chronicle). Experience with SOAR platforms (e.g., Palo Alto XSOAR, Splunk SOAR). Scripting experience (Python, PowerShell, Bash) for automation and integration tasks.
Certifications such as:
Splunk Certified Architect IBM QRadar Certified Specialist Certified Information Systems Security Professional (CISSP) Certified SOC Analyst (CSA) GIAC Certified Detection Analyst (GCDA)
Job Type:
Contract Pay:
$119,137.00 – $128,820.00 per year
Schedule:
8 hour shift
Work Location:
In person