Home

Onsite role :: Sumo Logic Platform :: Minneapolis, MN :: contract at Minneapolis, Minnesota, USA
Email: [email protected]
From:

sushil,

mitsinfo

[email protected]

Reply to:   [email protected]

Hi

Please share the resume on [email protected]

Role name:

Sumo Logic Platform

Location :

Minneapolis, MN

Job type : contract

Role name: |

Engineer |

Role Description: |

Primary Skill - Sumo Logic PlatformSecondary Skill - AnsibleMust have very good automation experience5+ years experience in designing and analyzing security logs from different sources.Experience transforming raw security data into actionable insights.Experience in automating the correlation of signals and ensuring a seamless flow of information for prompt response (action). This involves working with advanced log analysis tools, security platforms, and scripting languages to develop automation frameworks that enable faster decision-making.Continuously monitor the effectiveness of log analysis and automation workflows, fine-tuning rules, scripts, and processes to reduce false positives and improve efficiency.Configure integrations between log sources and automated response tools, ensuring accurate and real-time data flow. Integrate various security tools (SIEMs, endpoint security, threat intelligence platforms, etc.) to streamline the flow of data and enhance automated detection and response capabilities.Develop and implement automation scripts and workflows to transition from detecting security signals (alerts, logs) to actionable responses (remediation actions).Developing and supporting a robust query language for users to filter, aggregate, and analyze log data within the Sumo Logic platform.Identifying and resolving performance bottlenecks in the log aggregation flow to maintain efficient data processing.Ensure that all log sources aggregated are reporting to the central log repository.Ensure log management (SumoLogic) policies are in place to meet regulatory and organizational security standards.5+ years experienceIn-depth knowledge of Securonix SIEM or other SIEM platforms like Splunk, QRadar, or ArcSight.Knowledge of SumoLogic and Query writing capability to identify anomalies based on use casesFamiliarity with security protocols, systems, and IT infrastructure (firewalls, proxies, IDS/IPS, endpoint security).Understanding of log analysis, event correlation, and security monitoring techniques.Ability to troubleshoot complex security issues and determine root causes quickly.Ability to communicate technical findings clearly to both technical and non-technical stakeholders. |

Competencies: |

Cyber Security |

Experience (Years): |

6-8 |

Essential Skills: |

Primary Skill - Sumo Logic PlatformSecondary Skill - AnsibleMust have very good automation experience5+ years experience in designing and analyzing security logs from different sources.Experience transforming raw security data into actionable insights.Experience in automating the correlation of signals and ensuring a seamless flow of information for prompt response (action). This involves working with advanced log analysis tools, security platforms, and scripting languages to develop automation frameworks that enable faster decision-making.Continuously monitor the effectiveness of log analysis and automation workflows, fine-tuning rules, scripts, and processes to reduce false positives and improve efficiency.Configure integrations between log sources and automated response tools, ensuring accurate and real-time data flow. Integrate various security tools (SIEMs, endpoint security, threat intelligence platforms, etc.) to streamline the flow of data and enhance automated detection and response capabilities.Develop and implement automation scripts and workflows to transition from detecting security signals (alerts, logs) to actionable responses (remediation actions).Developing and supporting a robust query language for users to filter, aggregate, and analyze log data within the Sumo Logic platform.Identifying and resolving performance bottlenecks in the log aggregation flow to maintain efficient data processing.Ensure that all log sources aggregated are reporting to the central log repository.Ensure log management (SumoLogic) policies are in place to meet regulatory and organizational security standards.5+ years experienceIn-depth knowledge of Securonix SIEM or other SIEM platforms like Splunk, QRadar, or ArcSight.Knowledge of SumoLogic and Query writing capability to identify anomalies based on use casesFamiliarity with security protocols, systems, and IT infrastructure (firewalls, proxies, IDS/IPS, endpoint security).Understanding of log analysis, event correlation, and security monitoring techniques.Ability to troubleshoot complex security issues and determine root causes quickly.Ability to communicate technical findings clearly to both technical and non-technical stakeholders. |

Desirable Skills: |

Primary Skill - Sumo Logic PlatformSecondary Skill - AnsibleMust have very good automation experience5+ years experience in designing and analyzing security logs from different sources.Experience transforming raw security data into actionable insights.Experience in automating the correlation of signals and ensuring a seamless flow of information for prompt response (action). This involves working with advanced log analysis tools, security platforms, and scripting languages to develop automation frameworks that enable faster decision-making.Continuously monitor the effectiveness of log analysis and automation workflows, fine-tuning rules, scripts, and processes to reduce false positives and improve efficiency.Configure integrations between log sources and automated response tools, ensuring accurate and real-time data flow. Integrate various security tools (SIEMs, endpoint security, threat intelligence platforms, etc.) to streamline the flow of data and enhance automated detection and response capabilities.Develop and implement automation scripts and workflows to transition from detecting security signals (alerts, logs) to actionable responses (remediation actions).Developing and supporting a robust query language for users to filter, aggregate, and analyze log data within the Sumo Logic platform.Identifying and resolving performance bottlenecks in the log aggregation flow to maintain efficient data processing.Ensure that all log sources aggregated are reporting to the central log repository.Ensure log management (SumoLogic) policies are in place to meet regulatory and organizational security standards.5+ years experienceIn-depth knowledge of Securonix SIEM or other SIEM platforms like Splunk, QRadar, or ArcSight.Knowledge of SumoLogic and Query writing capability to identify anomalies based on use casesFamiliarity with security protocols, systems, and IT infrastructure (firewalls, proxies, IDS/IPS, endpoint security).Understanding of log analysis, event correlation, and security monitoring techniques.Ability to troubleshoot complex security issues and determine root causes quickly.Ability to communicate technical findings clearly to both technical and non-technical stakeholders. |

Thanks and Regards

Sushil Kaushik 

MITS LLC

Keywords: information technology Minnesota
Onsite role :: Sumo Logic Platform :: Minneapolis, MN :: contract
[email protected]
[email protected]
View All
09:13 PM 27-Feb-25


To remove this job post send "job_kill 2212542" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]


Time Taken: 11

Location: Minneapolis, Minnesota