SIEM Analyst (Splunk)-Onsite

The Norland Group San Jose, CA

Company

The Norland Group

Location

San Jose, CA

Type

Full Time

Job Description

Location: San Jose, CA Pay Rate:$70-$75 Contract Duration:6 months contract Monitor and analyze security event logs from various sources (e.g., firewalls, intrusion detection systems, endpoint protection) to identify potential security threats. Responsibilities: • Monitor, triage, and investigate logs and alerts generated in the Splunk SIEM platform. • Perform initial analysis of security events, escalate incidents as needed, and assist with root cause identification. • Conduct in-depth analysis of security incidents to determine root cause and recommend remediation steps. • Support the integration of logs from enterprise systems into the Splunk environment. • Validate log completeness, rule logic, and alert relevance across critical infrastructure. • Tune and optimize correlation rules, dashboards, and use cases for operational efficiency. • Perform regular vulnerability scans using tools such as Tenable and Rapid7 Insight VM to identify potential vulnerabilities in the organization's network infrastructure. • Prioritize remediation efforts based on risk assessment and business impact. • Coordinate remediation efforts with IT teams to ensure timely patching of identified vulnerabilities. • Conduct threat hunting activities using tools such as SIEM, EDR, and CASB to proactively identify potential threats that may have evaded traditional security controls. • Participate in incident response and threat hunting efforts when needed. • Monitor network traffic, detect anomalies, and respond to potential security threats using advanced security tools and technologies. • Assist in improving SIEM-related processes, detection coverage, and alert fidelity. • Collaborate with the team to respond quickly and effectively in the event of a security breach or incident. • Maintain documentation related to log flows, triage procedures, detection use cases, and cybersecurity best practices. • Develop and maintain documentation on cybersecurity processes, procedures, and operational standards Requirements: • Bachelor’s degree in Computer Science, Information Assurance, or a related field; Master’s degree preferred. • 5+ years of experience in a SOC or cybersecurity role with hands-on experience in SIEM platforms (Splunk preferred). • Proven expertise in threat analysis, incident response, and vulnerability management. • Strong understanding of log sources such as Windows/Linux servers, firewalls, and cloud infrastructure. • Experience analyzing security events and triaging alerts in complex, multi-platform environments. • Familiarity with cloud platforms (e.g., AWS, Azure, or similar). • Experience with vulnerability management tools such as Tenable or Rapid7 Insight VM; familiarity with other scanning tools is a plus. • Knowledge of detection engineering, correlation rules, and security incident workflows. • Ability to work collaboratively across teams and communicate findings clearly and professionally. • Inclusive and adaptable, with the ability to navigate diverse global environments and norms. • A curious and resilient learner, eager to understand challenges through data-driven approaches. • Innovative and proactive, capable of exploring new ideas and adapting quickly to change. • Relevant certifications (e.g., Splunk Core Certified Power User, Security+, GCIA, or similar) are a plus. We encourage Minorities, Women, Protected Veterans and Disabled individuals to apply for all positions that they may be qualified for. We maintain a drug-free workplace and perform pre-employment substance abuse testing and background checks If you are interested in this position, please submit your resume in aWord Document with the month and yearthat you have worked at each previous position to [email protected] copy: 473917-SIEM Analyst (Splunk)-Onsite to the email Subject Line. Job Posted Date: 7/15/2025
Apply Now

Date Posted

07/10/2025

Views

0

Back to Job Listings ❤️Add To Job List Company Info View Company Reviews
Neutral
Subjectivity Score: 0

Similar Jobs

Sr. Data Scientist - UCLA

Views in the last 30 days - 0

Bachelors Degree related field or equivalent combination of education and experience They will develop and review reproducible code to integrate and

View Details

Industrial Security Analyst - Northrop Grumman

Views in the last 30 days - 0

Must effectively interface daily with the site Facility Security Officer FSO government and contractor customers NG program management and other NG

View Details

Information Assurance Security Analyst - SMS Data Products Group, Inc.

Views in the last 30 days - 0

Must have demonstrated STIG analysis experience candidate need to be able to interpret them assess systems for compliance and document findings in the...

View Details

Senior Staff Engineer Machine Learning - GENERAL ATOMICS

Views in the last 30 days - 0

Typically requires a bachelors degree masters degree or PhD in computer science engineering mathematics or a related technical discipline from an accr...

View Details

Senior Cybersecurity Analyst - Ledgent Technology

Views in the last 30 days - 0

Collaborate with the Companys Security Advisory Committee Companys segment leaders and other security experts around the state to develop plans if

View Details

TWMS Web Developer | Active TS clearance - General Dynamics Information Technology

Views in the last 30 days - 0

Assist architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform

View Details