Logo
Palo Alto Networks

Staff Security Engineer (SIEM & Data Management)

Palo Alto Networks, Santa Clara, California, us, 95053


Staff Security Engineer (SIEM & Data Management)

Palo Alto Networks At Palo Alto Networks everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of life. Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we’re looking for innovators who are as committed to shaping the future of cybersecurity as we are. Who We Are We take our mission of protecting the digital way of life seriously. We are relentless in protecting our customers and we believe that the unique ideas of every member of our team contributes to our collective success. Our values were crowdsourced by employees and are brought to life through each of us every day - from disruptive innovation and collaboration to execution. As a member of our team, you will be shaping the future of cybersecurity. We work fast, value ongoing learning, and we respect each employee as a unique individual. Job Description

In this role, you will be responsible for executing security-related data engineering programs and managing data management & SIEM platforms. You will work closely with the SOC and cross-functional teams to manage and develop tools and infrastructure that enable the Information Security team to prevent, detect, contain, and manage risks within the Palo Alto Networks Enterprise environment. You will have an extensive background in managing and engineering SIEM solutions within an enterprise environment; including design, implementation, and maintenance of all aspects of our SIEMs and its components. Your Impact Implement and manage log collection and storage solutions across various platforms, including servers, applications, and cloud services. Ensure logs are collected, parsed, and stored securely and comply with industry regulations and organizational policies. Review and optimize log retention policies and storage solutions to balance performance and compliance. Design, deploy, and maintain the organization's SIEM platforms to ensure it effectively monitors and detects potential security threats. Develop and fine-tune SIEM rules, alerts, and dashboards to detect suspicious activities and reduce false positives. Integrate new data sources into the SIEM platform and ensure all relevant security data is captured and analyzed. Data Analysis

Analyze log and event data from multiple sources to identify patterns, anomalies, and potential security incidents. Perform threat hunting by proactively searching for signs of compromise or malicious activity in log data. Generate reports and dashboards to communicate findings to technical and non-technical stakeholders, including senior management.

Collaborate with the incident response team to investigate and mitigate security incidents, providing insights derived from log and SIEM data. Provide recommendations for improvements based on incident analysis and lessons learned. Collaboration and Training

Work closely with IT, DevOps, and other security teams to ensure the continuous improvement of security monitoring capabilities. Mentor junior analysts on log management, SIEM operations, and data analysis techniques. Conduct training sessions on SIEM best practices and incident detection strategies.

Compliance and Documentation

Ensure compliance with relevant industry standards and regulations (e.g., GDPR, HIPAA, PCI-DSS) concerning log management and data retention. Maintain comprehensive documentation for all log management, SIEM configurations, processes, and procedures.

Qualifications

Your Experience Bachelor’s degree in Information Security, Computer Science, Data Analytics, or a related field, or equivalent work experience or equivalent military experience required. 3+ years of experience in log management, SIEM engineering, and/or data analysis in a security context. Experience with popular SIEM platforms such as Splunk, IBM QRadar, ArcSight, or ELK/Elastic Stack. Strong understanding of log management principles, including log collection, parsing, storage, and analysis. Proficiency in SIEM configuration, rule creation, and alert tuning. Solid knowledge of cybersecurity concepts, including threat detection, incident response, and vulnerability management. Experience with scripting languages (e.g., Python, PowerShell) for data analysis and automation. Familiarity with regulatory requirements and standards (e.g., FedRAMP, MLPS, NIST, PCI) related to data retention and security monitoring. Excellent problem-solving skills and attention to detail. Strong communication skills, with the ability to present complex technical information to non-technical audiences. Additional Information

The Team We’re not your ordinary Information Security team. We’re a diverse group of security professionals who challenge the status quo in order to protect Palo Alto Networks and our customers. Driving innovation on the Information Security team of the fastest-growing high-tech cybersecurity company is a once-in-a-lifetime opportunity. Compensation Disclosure The compensation offered for this position will depend on qualifications, experience, and work location. The starting base salary is expected to be between $119,000/yr to $192,500/yr. Is role eligible for Immigration Sponsorship? No. Our Commitment We’re problem solvers that take risks and challenge cybersecurity’s status quo. We are committed to providing reasonable accommodations for all qualified individuals with a disability. Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to legally protected characteristics.

#J-18808-Ljbffr