The Threat Detection Engineer is part of Threat Detection Engineering team in the Experian GSO. This role will serve as an engineering resource responsible for the innovation, development, and maintenance of SIEM & UEBA systems. Specific focus will be directed to understanding various vendor feeds and developing the capability of our analytics tools to detect anomalous, suspicious, or malicious behaviors. An ideal candidate will have extensive information security experience particularly in incident response and able to apply that knowledge to drive future content to reduce risk.
The Systems Security Engineer Expert will work closely with the various internal teams, including but not limited to cyber threat intelligence analysts, SOC analysts, incident management, server and network administrators, security tool administrators, and business unit customers.
What you'll be doing Understand data feeds of various security tools and logs that feed the SIEM & UEBA technologies. Ability to identify capabilities and quality of these feeds and recommend improvements.Ability to craft new content use cases based on threat intelligence, analyst feedback, available log data, previous incidents.Perform day to day activities of the content life cycle, including creating new use cases, testing content; tuning, and removing content; and maintaining associated documentation.Work with the other security functions and product SMEs to identify gaps within the existing analytical capability.Development of parsers/field extractions to facilitate reliable content developmentDevelopment of custom scripts as required to augment default SIEM functionalityParticipate in root cause analysis on security incidents and provide recommendations for containment and remediationAct as the liaison to business units to fulfill audit, regulatory compliance and/or corporate security policy requirements.Create, implement, and maintain novel analytic methods and techniques for incident detectionEnsure documentation for content is available on team wiki- specifically including content roadmap and documentation on current content More about you Required Qualifications: Prior experience in SIEM content development (LogRhythm, Splunk, QRadar, McAfee ESM, or similar SIEM platform) Splunk preferredUnderstanding of various log formats and source data for SIEM AnalysisSolid background with Windows and Linux platforms (security or system administration)Ability to effectively communicate with anyone, from end users to senior leadership- facilitating technical and non-technical conversations.Strong incident handling/incident response/security analytics skillsDeep understanding of technical concepts including networking and various cyber attacksSolid comprehension of various security controls, capabilities and use in a corporate environmentExceptional problem-solving capabilitiesStrong documentation and communication skillsDemonstrated history of innovation and/or creativityAbility to drive process improvements and identify gapsAbility to excel in a team, as an individual, in a fast-paced deadline driven organizationKnowledge of programming/scripting fundamentalsPassion for excellence and attention to detail Desired Skills & Experience: 3+ years' of information security experience, preferably engineering or development1+ years' experience supporting a SIEM platform in a content development or administrative role2+ years' experience performing SOC analysis and/or incident responseBachelor's Degree or higher degree in Computer Science, Information Security or similar discipline is preferredExperience with a wide range of security productsIndustry Security Certifications (CISSP, SANS) preferredScripting (Python is preferred, but most any programming knowledge will be sufficient if engineer is willing to learn Python)