To get the best candidate experience, please consider applying for a maximum of 3 roles within 12 months to ensure you are not duplicating efforts.
Job Category: Software Engineering
About Salesforce:
We're Salesforce, the Customer Company, inspiring the future of business with AI+ Data +CRM. Leading with our core values, we help companies across every industry blaze new trails and connect with customers in a whole new way. And, we empower you to be a Trailblazer, too - driving your performance and career growth, charting new paths, and improving the state of the world. If you believe in business as the greatest platform for change and in companies doing well and doing good - you've come to the right place.
We are seeking skilled and experienced Security Engineers to join our DnR Threat Management Team in a high visibility and impact role for the initial migration, and long term management of our security information and event management (SIEM) infrastructure, data, and detection logic from Nirvana Splunk to Google Chronicle. In this role, you will be responsible for overseeing the log/data migration process, ensuring seamless integration of logs and maintaining the system's performance and security posture, and the daily (ongoing) Development Security Operations of the Google Chronicle Platform (SIEM).
Key Responsibilities:
- Design and develop parsers for extracting structured data from log messages.
- Extend existing parsers to support new log formats or data sources.
- Collaborate with stakeholders to understand parsing requirements and ensure compatibility with existing systems.
- Test and validate parsers to ensure accuracy and efficiency.
- Document parser specifications and provide support for integration into the logging pipeline.
- Identify requirements for integrating new data sources or systems with the logging infrastructure.
- Develop custom connectors or plugins to ingest log data from diverse sources.
- Integrate third-party tools or services for enhanced log analysis and correlation.
- Conduct testing and validation of new integrations to ensure reliability and performance.
- Provide documentation and support for users utilizing new integrations.
- Identify opportunities for automation within the logging infrastructure and related processes.
- Develop scripts and workflows to automate repetitive tasks such as log ingestion, parsing, and analysis.
- Integrate logging tools and systems with other internal tools and platforms for seamless data exchange.
Qualifications:
- 3-5 years of experience in information security, with a focus on security engineering and analysis.
- Hands-on experience with SIEM platforms.
- Strong understanding of security principles, threat detection techniques, and incident response procedures.
- Proficiency in scripting languages such as Python.
- Proficiency in coding Java or equivalent.
- Excellent communication skills, with the ability to effectively collaborate with cross-functional teams and communicate technical concepts to non-technical stakeholders.
- Adaptability and willingness to learn new technologies and methodologies in a fast-paced environment.
If you are passionate about enhancing our organization's security posture through effective migration and maintenance of security infrastructure, we encourage you to apply for this exciting opportunity.
#J-18808-Ljbffr