Job Description
Experience: 7+ Years
Location: Pune / Mumbai
Must Have:
- 5+ years of experience in SIEM administration, preferably with Splunk ES
- Should have worked as L3 resource & experience in Leading Security Operations Center teams. Uses Splunk for SIEM, threat detection, and incident response while driving monitoring strategy and process improvement.
- Proficiency in SPL (Search Processing Language)
- Job Role: Deploy, configure, and maintain Splunk Enterprise and Splunk Enterprise Security (ES).
- Manage data onboarding, parsing, and normalization from various log sources.
- Develop and tune correlation rules, dashboards, and alerts.
- Monitor system performance and ensure high availability and scalability.
- Integrate SOAR with threat intelligence platforms, ticketing systems, and other security tools and Python scripting for automation.
- Familiarity with log formats (Syslog, JSON, XML), network protocols, and security tools.
- Experience with threat intelligence feeds and MITRE ATT&CK framework.
Experience: 5-8 Years .
Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention.