Technical Lead/Manager for Splunk Enterprise Seucrity - job id 32675


Your Way To Work™

Technical Lead/Manager for Splunk Enterprise Seucrity

$200,000 - Per Year Base Salary F/T Employee

Financial District



How to Apply

logo

Jason Vu


logo

(646) 876-9536


logo

(212) 616-4800 ext-290




A Full-time position at a Global investments company providing financial services for institutions, corporations or individual investors in 35 countries and more than 100 markets.


Pay Options: F/T Employee.

Contact Jason Vu. call (646)876-9536 / (212)616-4800 ext.290 or email jason@sans.com with the Job Code JV32675 or Click the Apply Now button ().

Location: Low Manhattan.


Skills required for the position: Information Security, SPLUNK, THREAT MODELING, TEAM LEAD.

Optional (not required): behavior analytics, UEBA, ARCSIGHT, SECURONIX, QRadar


Detailed Info:


Pay in the $180k - $200k base+ bonus range


Seeking Technical Lead/Manager of Splunk Enterprise Security implentation for SIEM cyber security analytics platform.


As a Security Analytics Platform Manager in Cybersecurity Analytics team, you will be responsible for the planning, designing, build and implementation of security analytics platform & initiatives. You will lead anddirect multiple initiatives/workstreams.



Development/Computing Environment: Qualifications


10 years of experience in information security or related technology experience required; experience in the securities or financial services industry is a plus


At least 5 years as a manager/supervisor, experience in hiring the right candidates to build ateam; skilled at delegation and empowerment of team members


Hands on experience in implementation of SIEM and big data tools like Splunk Enterprise Security is required. Experience with Securonix UEBA, ELK, ArcSight ESM and QRadar is preferred.

Experience using/implementing Big data, machine learning, behavior analytics based solutions using technologies like Hadoop, Apache Spark, R.


Experience with developing solutions for Security Operations Center and supporting SOC operations.

Solid understanding of cybersecurity concepts such as cyber kill chain, APT, Threat Intelligence etc.

Experienced in acquisition, analysis and correlation of data from various security event sources such as proxy, firewall, IDS/IPS, DLP tools etc.


Hands on experience in analyzing the data structure/data model pertaining to security event sources like proxy, firewalls, network devices, IDS/IPS etc.


Strong technical background in Unix, Windows, SOA, Java, Apache, FOSS technologies, Virtualization technologies like VMWare, Storage technologies.

Information Security certifications such CISSP, SANS, Ethical Hack preferred.


Vendor management experience is a plus



Bachelor's degree in computer science or a related disci.

The position offers competitive rate.


Job Id: 32675