Onsite role :: Sumo Logic Platform :: Minneapolis, MN :: contract at Minneapolis, Minnesota, USA |
Email: [email protected] |
From: sushil, mitsinfo [email protected] Reply to: [email protected] Hi Please share the resume on [email protected] Role name: Sumo Logic Platform Location : Minneapolis, MN Job type : contract Role name: | Engineer | Role Description: | Primary Skill - Sumo Logic PlatformSecondary Skill - AnsibleMust have very good automation experience5+ years experience in designing and analyzing security logs from different sources.Experience transforming raw security data into actionable insights.Experience in automating the correlation of signals and ensuring a seamless flow of information for prompt response (action). This involves working with advanced log analysis tools, security platforms, and scripting languages to develop automation frameworks that enable faster decision-making.Continuously monitor the effectiveness of log analysis and automation workflows, fine-tuning rules, scripts, and processes to reduce false positives and improve efficiency.Configure integrations between log sources and automated response tools, ensuring accurate and real-time data flow. Integrate various security tools (SIEMs, endpoint security, threat intelligence platforms, etc.) to streamline the flow of data and enhance automated detection and response capabilities.Develop and implement automation scripts and workflows to transition from detecting security signals (alerts, logs) to actionable responses (remediation actions).Developing and supporting a robust query language for users to filter, aggregate, and analyze log data within the Sumo Logic platform.Identifying and resolving performance bottlenecks in the log aggregation flow to maintain efficient data processing.Ensure that all log sources aggregated are reporting to the central log repository.Ensure log management (SumoLogic) policies are in place to meet regulatory and organizational security standards.5+ years experienceIn-depth knowledge of Securonix SIEM or other SIEM platforms like Splunk, QRadar, or ArcSight.Knowledge of SumoLogic and Query writing capability to identify anomalies based on use casesFamiliarity with security protocols, systems, and IT infrastructure (firewalls, proxies, IDS/IPS, endpoint security).Understanding of log analysis, event correlation, and security monitoring techniques.Ability to troubleshoot complex security issues and determine root causes quickly.Ability to communicate technical findings clearly to both technical and non-technical stakeholders. | Competencies: | Cyber Security | Experience (Years): | 6-8 | Essential Skills: | Primary Skill - Sumo Logic PlatformSecondary Skill - AnsibleMust have very good automation experience5+ years experience in designing and analyzing security logs from different sources.Experience transforming raw security data into actionable insights.Experience in automating the correlation of signals and ensuring a seamless flow of information for prompt response (action). This involves working with advanced log analysis tools, security platforms, and scripting languages to develop automation frameworks that enable faster decision-making.Continuously monitor the effectiveness of log analysis and automation workflows, fine-tuning rules, scripts, and processes to reduce false positives and improve efficiency.Configure integrations between log sources and automated response tools, ensuring accurate and real-time data flow. Integrate various security tools (SIEMs, endpoint security, threat intelligence platforms, etc.) to streamline the flow of data and enhance automated detection and response capabilities.Develop and implement automation scripts and workflows to transition from detecting security signals (alerts, logs) to actionable responses (remediation actions).Developing and supporting a robust query language for users to filter, aggregate, and analyze log data within the Sumo Logic platform.Identifying and resolving performance bottlenecks in the log aggregation flow to maintain efficient data processing.Ensure that all log sources aggregated are reporting to the central log repository.Ensure log management (SumoLogic) policies are in place to meet regulatory and organizational security standards.5+ years experienceIn-depth knowledge of Securonix SIEM or other SIEM platforms like Splunk, QRadar, or ArcSight.Knowledge of SumoLogic and Query writing capability to identify anomalies based on use casesFamiliarity with security protocols, systems, and IT infrastructure (firewalls, proxies, IDS/IPS, endpoint security).Understanding of log analysis, event correlation, and security monitoring techniques.Ability to troubleshoot complex security issues and determine root causes quickly.Ability to communicate technical findings clearly to both technical and non-technical stakeholders. | Desirable Skills: | Primary Skill - Sumo Logic PlatformSecondary Skill - AnsibleMust have very good automation experience5+ years experience in designing and analyzing security logs from different sources.Experience transforming raw security data into actionable insights.Experience in automating the correlation of signals and ensuring a seamless flow of information for prompt response (action). This involves working with advanced log analysis tools, security platforms, and scripting languages to develop automation frameworks that enable faster decision-making.Continuously monitor the effectiveness of log analysis and automation workflows, fine-tuning rules, scripts, and processes to reduce false positives and improve efficiency.Configure integrations between log sources and automated response tools, ensuring accurate and real-time data flow. Integrate various security tools (SIEMs, endpoint security, threat intelligence platforms, etc.) to streamline the flow of data and enhance automated detection and response capabilities.Develop and implement automation scripts and workflows to transition from detecting security signals (alerts, logs) to actionable responses (remediation actions).Developing and supporting a robust query language for users to filter, aggregate, and analyze log data within the Sumo Logic platform.Identifying and resolving performance bottlenecks in the log aggregation flow to maintain efficient data processing.Ensure that all log sources aggregated are reporting to the central log repository.Ensure log management (SumoLogic) policies are in place to meet regulatory and organizational security standards.5+ years experienceIn-depth knowledge of Securonix SIEM or other SIEM platforms like Splunk, QRadar, or ArcSight.Knowledge of SumoLogic and Query writing capability to identify anomalies based on use casesFamiliarity with security protocols, systems, and IT infrastructure (firewalls, proxies, IDS/IPS, endpoint security).Understanding of log analysis, event correlation, and security monitoring techniques.Ability to troubleshoot complex security issues and determine root causes quickly.Ability to communicate technical findings clearly to both technical and non-technical stakeholders. | Thanks and Regards Sushil Kaushik MITS LLC Keywords: information technology Minnesota Onsite role :: Sumo Logic Platform :: Minneapolis, MN :: contract [email protected] |
[email protected] View All |
09:13 PM 27-Feb-25 |