SIEM engineer, hibrido
Empresa
GlobalSysInfo
Provincia
Madrid
Ciudad
Madrid
Tipo de Contrato
Tiempo Completo
Descripción
SIEM engineer
Job Title: SIEM Engineer Splunk Specialist
Location: Canillejas, Madrid (Hybrid Work Model)
Description:
As a SIEM Engineer, contributed to the implementation, optimization, and operation of the SIEM system
(Splunk) to enhance the organization s cybersecurity posture. Focused on threat detection, incident response,
and ensuring compliance through effective monitoring and correlation strategies. Played a key role in
protecting network infrastructure and supporting investigation efforts.
Key Responsibilities:
Implement, configure, and maintain the SIEM platform (Splunk)
Design and develop correlation rules and use cases for threat detection
Monitor, analyze, and respond to security events and incidents
Support forensic investigations and incident remediation efforts
Optimize system performance and ensure continuous health monitoring
Align operations with compliance standards and cybersecurity best practices
Collaborate with security teams and document processes and configurations
Projects Covered:
SIEM Deployment Configuration
Use Case Development Correlation Rule Implementation
Threat Detection Incident Response Coordination
Performance Tuning Health Monitoring
Documentation Compliance Alignment
Requirements:
Strong experience with Splunk SIEM platform
Knowledge of threat detection methodologies and incident response
Familiarity with performance tuning and best practices in system health monitoring
Experience in hybrid environments and collaboration across security teams
Technical background in cybersecurity, systems, or network engineering
Splunk, SIEM,
Job Title: SIEM Engineer Splunk Specialist
Location: Canillejas, Madrid (Hybrid Work Model)
Description:
As a SIEM Engineer, contributed to the implementation, optimization, and operation of the SIEM system
(Splunk) to enhance the organization s cybersecurity posture. Focused on threat detection, incident response,
and ensuring compliance through effective monitoring and correlation strategies. Played a key role in
protecting network infrastructure and supporting investigation efforts.
Key Responsibilities:
Implement, configure, and maintain the SIEM platform (Splunk)
Design and develop correlation rules and use cases for threat detection
Monitor, analyze, and respond to security events and incidents
Support forensic investigations and incident remediation efforts
Optimize system performance and ensure continuous health monitoring
Align operations with compliance standards and cybersecurity best practices
Collaborate with security teams and document processes and configurations
Projects Covered:
SIEM Deployment Configuration
Use Case Development Correlation Rule Implementation
Threat Detection Incident Response Coordination
Performance Tuning Health Monitoring
Documentation Compliance Alignment
Requirements:
Strong experience with Splunk SIEM platform
Knowledge of threat detection methodologies and incident response
Familiarity with performance tuning and best practices in system health monitoring
Experience in hybrid environments and collaboration across security teams
Technical background in cybersecurity, systems, or network engineering
Splunk, SIEM,