CrowdStrike

Senior Engineer – SIEM Integrations

CrowdStrike

full-time

Posted on:

Origin:  • 🇮🇳 India

Visit company website
AI Apply
Manual Apply

Job Level

Senior

Tech Stack

AWSAzureCloudCyber SecurityDistributed SystemsFirewallsGoogle Cloud PlatformPythonSplunkSQL

About the role

  • As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Next Gen-SIEM Integrations team at Next Gen-SIEM is responsible for building out of the box integrations for 3rd party products to ingest data into SIEM platform. Design, develop, and maintain out of the box data connectors for CrowdStrike Next-Gen SIEM, ensuring seamless ingestion of security data from various third-party products. Set up and maintain a lab or test environment for security products to validate data connectors and troubleshoot issues. Troubleshoot and resolve issues with existing data connectors to ensure reliable log ingestion. Collaborate with internal teams to define efficient logging, error handling, data normalization and documentation for data connectors. Research and implement best practices for ingesting security logs from Firewalls, IDS/IPS, Cloud Security products, Endpoint Security, and other security products and platforms. Write and maintain high-quality technical documentation for integration methods and troubleshooting guides. Provide on-call support for critical data ingestion issues and production incidents. Work with customers, customer success and customer support teams to troubleshoot and resolve data ingestion-related issues and ensure effective communication.

Requirements

  • Bachelor’s or Master’s degree in Computer Science or related field or equivalent work experience. 10+ years of experience in cybersecurity and SIEM integrations Experience in developing data connectors or ingestion pipelines for SIEM platforms such as Splunk, Sentinel, Exabeam, QRadar etc. Experience in setting up and managing environments for security products such as Firewalls, IDS/IPS, EDR, CASB, Identity Security, Email Security etc. Experience with security events and its formats such as Syslog, CEF, LEEF, JSON, XML Experience in log processing or shipping tools such as Cribl, Splunk forwarder, Azure monitoring agent, LogScale log collector etc. Experience with cloud-native logging services such as AWS CloudWatch, CloudTrail, Azure Monitor, or GCP Logging Proficiency in at least one programming language, preferably Python Proficiency in writing complex queries using KQL, SPL, CQL, SQL etc Strong documentation, communication and customer interaction skills Bonus Points: Knowledge of security data normalization schemas, parsing and data enrichment