Skip to main content

Pozíció leírása / Job description

With key markets in the Netherlands, the UK, and the US, as well as growth markets in China, Brazil, and Iberia, our international partner supports one of the largest financial services groups, by offering IT, finance, risk, model validation, actuarial, audit, and asset management services with the purpose of helping their customers to live their best lives.   

A diverse workforce and an inclusive culture are fostered by our partner. They value diversity as a whole, including but not limited to, racial, gender, and ability diversity as well as diversity in language, culture, beliefs, age, origin, background, perspectives, and experiences.

The Security Event Management (SEM) team is the primary team responsible for gathering and providing Security Intelligence into the SIEM platform. Correlation of security events, infrastructure devices, and application events are presented to the Global Security Operations Centers (SOC) for evaluation of investigation or false positive identification.

What You Will Do:

  • Work directly with Infrastructure and Application teams to align security and event applications with predetermined SOC use cases that provides the intelligence necessary for investigations.
  • Work within the Security Strategy to onboard the identified number of applications across all Business Units (BU), provide direction and guidance to the Business when difficulties arise with streaming events into the SIEM.
  • Assist in managing time resources and commitments with your customers to ensure onboarding activities are completed on time and in scope.

Elvárások / Requirements

What You Will Need:
Qualifications

  • 5 years of Splunk SIEM (Core, ES, etc) experience
  • Bachelor degree or equivalent training, education, and work experience
  • Splunk Core experiences with Deployment Server configuration experience
  • Splunk Core experience with Infrastructure support knowledge (Indexers, Search Heads)
  • HTTP Event Collector (HEC) experience for streaming to endpoints
  • SPL Query Language experience
  • AWS – Lambda, S3 format experience, Azure Cloud blob format experience for SaaS ingestion
  • Unix / Linux OS experience, Next Gen Firewall experience, Endpoint Threat Detection experience
  • Experience with proper source typing
  • Familiarity with Syslog technology
  • RegEx and stream parsing experience

Preferred

  • Splunk Infrastructure deployment methodology
  • Experience with using a SIEM in a Global organization and having awareness of GDPR and other compliance regulations
  • Splunk Heavy Forwarder experience
  • Splunk Enterprise Security experience
  • Splunk Universal Forwarder management
  • Splunk Deployment / Cluster management
  • SNOW, Confluence, Jira experience

Amit nyújtunk / Benefits

  • Home office
  • Competitive salary
  • Flexible working hours
  • Very good development opportunities in a global company
  • Highly people-centric environment
  • Diverse and interesting tasks and projects
  • Health Insurance
  • Training & Development opportunities

Randstad Hungária Kft. logó

Senior Infrastructure Security Specialist

Budapest
Full time

Published on 21.06.2024

Share this job now