Connecting...

W1siziisijiwmtgvmtivmtmvmdkvmjuvntavmziyl2ljdc5qcgcixsxbinailcj0ahvtyiisijiwmdb4nzawiyjdxq
Job

SIEM Architect x2

  • Job ref:

    1172419/001_1620811950

  • Location:

    Basingstoke, Hampshire

  • Sector:

    ICT

  • Job type:

    Contract

  • Salary:

    Negotiable

  • Contact:

    Liam Parsons

  • Email:

    liam.parsons@cbsbutler.com

  • Published:

    4 months ago

  • Start date:

    ASAP

  • Consultant:

    #

SIEM Architect x2

- Location Basingstoke or Bracknell
- Competitive Daily rate
- 6 month initial contract

SIEM / Splunk / Logrythm / RedHat

* Please note this is an SC Cleared position

Job Description

We are looking for a lead SIEM Architect to work in close partnership with our customer(s) and project teams to deliver cutting-edge solutions. Reporting into the Solution Lead, the post holder will own all aspects of the delivery of the SIEM solution assuring that the technical proposals are aligned to the client's vision. Throughout the delivery lifecycle managing 3rd parties and requests for change ensuring there is no impact upon the overall architectural solution.

Your Experience

  • Proven track record of leading the delivery of SIEM technical solutions

  • A proven track record of implementing a LogRhythm SIEM and NetMon environment using physical appliances

  • Experience of creating multiple machine policies including full endpoint monitoring of UAD's

  • Experience of Monitoring Enterprise network traffic at Application layer

  • Experience of the Log Processing Policy and the writing of regular expressions

Technical skills:

  • Experience of creating High Level Designs, Low Level Designs, BOM's and support documentation

  • Experience of implementing a LogRhythm SIEM and NetMon environment using physical appliances monitoring devices, end user activity, collecting and processing logs in accordance with the appropriate architectural patterns e.g. JSP440, GPG13, SafeGuarding GOLD guidelines and standards etc.

  • Experience of creating multiple machine policies including full endpoint monitoring of UAD's employing File Integrity Monitoring, Data Loss Defender CD/DVD and USB port Monitoring, Registry Integrity Monitoring, User Activity Monitoring, Network Activity Monitoring.

  • Experience of creating Regexes and parsing rules for "non-standard" logs

  • Experience of Monitoring Enterprise network traffic at Application layer

  • Experience of the Log Processing Policy and the writing of regular expressions

  • Experience of working with 3rd parties