SIEM Administrator
Job
Recutify Inc.
Deerfield, IL (In Person)
Full-Time
Review key factors to help you decide if the role fits your goals.
Pay Growth
?
out of 5
Not enough data
Not enough info to score pay or growth
Job Security
?
out of 5
Not enough data
Calculating job security score...
Total Score
75
out of 100
Average of individual scores
Skill Insights
Compare your current skills to what this opportunity needs—we'll show you what you already have and what could strengthen your application.
Job Description
Role Summary The SIEM Administrator will design, configure, and manage the enterprise SIEM platform with a strong focus on integrating and operationalizing CrowdStrike Falcon telemetry. The role ensures effective log ingestion, high quality detections, and smooth collaboration with SOC and IR teams to strengthen monitoring and response capabilities. Key Responsibilities SIEM Administration Deploy, manage, and optimize SIEM platforms (Splunk / QRadar / Sentinel / Elastic). Build and maintain data ingestion pipelines, field extractions, correlation rules, dashboards, and RBAC. Conduct health monitoring, upgrades, patching, and performance tuning for SIEM infrastructure. Ensure retention policies, storage lifecycle, and configurations meet security and compliance needs. CrowdStrike Falcon Engineering Integrate Falcon (FDR/Event Streams/API) telemetry into the SIEM. Normalize, enrich, and map Falcon events to
MITRE ATT&CK.
Develop detections, dashboards, and endpoint security reports. Ensure full sensor coverage, log completeness, and detection quality. Detection Engineering & Tuning Write and tune correlation rules for endpoint, identity, network, and cloud threats. Reduce false positives and improve alert fidelity through tuning and contextual enrichment. Maintain detection documentation and lifecycle (dev test prod). Automation & Integration Integrate SIEM with SOAR for automated enrichment and response workflows. Build automation for IOC lookups, ticketing, host isolation, and log queries. Ensure reliable execution and governance for all automated tasks. Logging, Coverage & Governance Define logging standards and ensure onboarding of critical log sources across IT, cloud, and security tools. Troubleshoot ingestion failures and maintain high data quality. Maintain runbooks, technical documentation, and compliance ready configurations. Cross Team Collaboration Work closely with SOC, IR, Endpoint, Network, and Cloud teams on improving detection and response processes. Provide SME support during incidents, investigations, and RCA discussions. Required Skills Technical 5 8 years of SIEM engineering/administration experience. Strong hands on expertise integrating CrowdStrike Falcon with SIEM platforms. Experience with log parsing, regex, JSON, APIs, andMITRE ATT&CK
mapping. Knowledge of endpoint, network, identity, and cloud logs (AWS/Azure/GCP). Scripting (Python, PowerShell, Bash) for automation and enrichment. Security Operations Experience supporting SOC and IR functions. Strong understanding of detection logic, alert triage, attacker TTPs, and investigation workflows. Professional Strong communication and documentation skills. Ability to work in high pressure incident scenarios. Strong analytical and troubleshooting capabilities. Preferred Experience with SOAR tools. Exposure to cloud logging and SIEM automation frameworks. Certifications such as Splunk Admin/Power User, SC 200, CrowdStrike CCFA/CCFR, CySA+, GCIHSimilar remote jobs
Volkswagen Group DE
Ashburn, VA
Posted2 days ago
Updated1 day ago
Similar jobs in Deerfield, IL
1001 Baxter Healthcare Corporation
Deerfield, IL
Posted3 days ago
Updated1 day ago
Similar jobs in Illinois
U025 Kraft Foods Group Brands LLC Company
Chicago, IL
Posted2 days ago
Updated1 day ago
Papa Johns
Champaign, IL
Posted2 days ago
Updated1 day ago