Subject Matter Expert - SIEM Solution

Bahrain - Manama Bahrain

A solid grasp of cybersecurity principles surrounding threat detection, incident response, risk

management, and compliance requirements.

● Expertise in configuring SIEM rules, alerts, and correlation mechanisms to detect and respond to

common cyber threats identified by organizations like NCSC, such as phishing attacks, malware

infections, and insider threats.

● Expertise in managing the integration of data sources into the SIEM environment,

including log collection from network devices, servers, applications, and cloud services,

and ensure compatibility with SIEM ingestion mechanisms and protocols.

● Understanding of NCSC's incident response framework and guidelines for effectively handling

cybersecurity incidents within an organization's SIEM environment.

● Knowledge of integrating threat intelligence feeds recommended by NCSC into SIEM platforms to

enhance threat detection capabilities and stay updated on emerging threats.

● Ability to configure SIEM solutions to follow to NCSC's Cyber Trust Programme and other

compliance requirements, including assisting organizations in obtaining Cyber Trust Programme

certification (optional).

● A strong ability to apply analytics techniques recommended by NCSC, like behavioral analytics

and anomaly detection, to pinpoint suspicious activities and potential security breaches.

● Familiarity with cybersecurity challenges and specific requirements relating to government

sector and its critical infrastructure, as outlined in NCSC sector-specific guidance.

● Knowledge of risk assessment methodologies recommended by NCSC and utilizing SIEM data to

identify, evaluate, and mitigate cybersecurity risks effectively.

Skills

Cybersecurity Configuration and Compliance:

• Configure SIEM solutions to align with NCSC's cybersecurity principles, incident

response frameworks, and compliance requirements.

• Ensure adherence to NCSC's Cyber Trust programme and other relevant

compliance standards, facilitating organizations in obtaining Cyber Trust

Programme certification if required.

SIEM Rules and Alerts Configuration:

• Skillfully configure SIEM rules, alerts, and correlation mechanisms to detect and

respond to common cyber threats identified by NCSC, including phishing attacks,

malware infections, and insider threats.

Data Source Integration and Compatibility:

• Manage the integration of diverse data sources into the SIEM environment,

ensuring compatibility with SIEM ingestion mechanisms and protocols.

• Facilitate log collection from network devices, servers, applications, and cloud

services to enhance threat detection capabilities.

Incident Response Framework:

• Demonstrate an understanding of NCSC's incident response framework and

guidelines for effectively handling cybersecurity incidents within organizations'

SIEM environments.

Threat Intelligence Integration:

• Integrate threat intelligence feeds recommended by NCSC into SIEM platforms

to enhance threat detection capabilities and stay updated on emerging threats.

Analytics Techniques and Risk Assessment:

• Apply analytics techniques recommended by NCSC, such as behavioral analytics

and anomaly detection, to pinpoint suspicious activities and potential security

breaches.

• Utilize SIEM data to identify, evaluate, and mitigate cybersecurity risks

effectively, adhering to risk assessment methodologies recommended by NCSC.

Post date: Today
Publisher: Bayt
Post date: Today
Publisher: Bayt