
Explore more
Salary
💰 $40,000 per year
About the role
- Implementing, integrating, and optimizing the SentinelOne Singularity AI SIEM platform
- Design, implement, and configure SentinelOne AI SIEM (Singularity Platform)
- Integrate multiple log sources including Endpoints, Firewalls, Network Devices, Cloud platforms, and IAM systems
- Develop and tune correlation rules, alerts, dashboards, and reports
- Monitor, analyze, triage, and respond to security incidents
- Reduce false positives and improve detection accuracy
- Map threats using the MITRE ATT&CK framework
- Support SOC operations (L1–L3) and incident response workflows
- Ensure compliance support for standards such as ISO 27001, SOC 2, PCI-DSS , etc.
- Provide technical documentation and knowledge transfer to stakeholders
Requirements
- 10+ Years
- Strong expertise in AI-driven SIEM, threat detection, incident response, and SOC operations.
- Hands-on experience with SentinelOne Singularity AI SIEM / XDR
- Strong understanding of SIEM concepts : log management, correlation, alerting, incident response
- Knowledge of Endpoint, Network, and Cloud Security
- Experience with SOC operations and incident handling
- Understanding of Threat Intelligence, IOC analysis , and MITRE ATT&CK
- Exposure to scripting or automation (Python, PowerShell – preferred)
- Good knowledge of TCP/IP, DNS, HTTP/HTTPS, SSL
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
AI-driven SIEMthreat detectionincident responselog managementcorrelationalertingscriptingautomationTCP/IPDNS
Certifications
ISO 27001SOC 2PCI-DSS