Monitoring Engineer
Role details
Job location
Tech stack
Job description
Assist in evaluating and selecting the right SIEM platform Design and implement SIEM infrastructure (on-prem or cloud) Define log onboarding strategy and scalable architecture Log Parsing & Onboarding
Work with infrastructure and application teams to collect logs from cloud, containers, Linux systems, and applications Build parsers and normalization rules to structure incoming log data Ensure completeness, consistency, and health of log pipelines Detection Engineering
Develop, test, and deploy correlation rules mapped to MITRE ATT&CK Create alerting logic to detect suspicious behaviors, misconfigurations, or compromise Fine-tune rules to reduce false positives and align with business context Incident Response Support
Assist in investigating security incidents using SIEM and other tools Provide visibility and context to the InfoSec team during incident analysis Improve detections and logging based on post-incident reviews Content & Dashboarding-
Build dashboards and visualizations for monitoring key security events Create custom searches and scheduled reports for internal teams SOAR & Automation Readiness
Prepare SIEM for future integration with SOAR. Document alert outputs and workflows to support automation Collaboration
Work with InfoSec, DevOps, and IT to ensure log coverage and high-fidelity detections Provide recommendations to improve monitoring and visibility across environments What makes you the perfect fit
Requirements
3-5+ years of experience in security engineering or monitoring roles Strong hands-on experience designing or operating a SIEM (any major platform: Splunk, Elastic, Sentinel, QRadar, etc.) Proficient in log parsing, normalization, and custom rule development Comfortable working with AWS, GCP, Kubernetes, Docker, and Linux log sources Solid scripting ability (Python, Bash, PowerShell, or similar) Familiar with MITRE ATT&CK, detection logic design, and alert tuning Able to work independently in a small team with broad responsibility
Nice to have:
Certifications such as GCFA, CPIA, or platform-specific certs (Splunk, Elastic, etc.) Exposure to SOAR platforms and security automation concepts Experience in early-stage security team setup or greenfield projects It'll also be an advantage if you have experience in:
Finance experience or knowledge of Trading Knowledge of TradingView We also love users who become teammates!