LogRythm Engineer

3 days ago


Delhi Gurugram NCR, India Clarity Consulting Full time ₹ 8,00,000 - ₹ 12,00,000 per year

Your work profile.

We are looking for a skilled and proactive LogRhythm L1 Engineer to join our Security Operations team. As a

Level 1 Engineer, you will be responsible for advanced analysis, troubleshooting, and remediation of security

incidents and events using the LogRhythm SIEM platform. You will work closely with other security

professionals to identify and respond to potential security threats, refine detection mechanisms, and optimize

security monitoring tools to ensure the highest level of security for the organization.

Key Responsibilities:

Advanced Log Monitoring and Analysis:

  • Conduct deeper analysis of security events and alerts generated by LogRhythm, correlating data across

various sources to identify potential security threats.

  • Perform advanced triage, classification, and root cause analysis of escalated security incidents.
  • Utilize the LogRhythm SIEM platform to investigate complex security events, identifying patterns and

relationships in logs to identify potential malicious activities.

Incident Escalation and Resolution:

  • Take ownership of high-priority and complex security incidents, working closely with the Level 1 team to

provide expertise and guidance.

  • Engage with incident response teams to perform deeper forensic analysis and assist with the

containment, mitigation, and recovery phases of security incidents.

  • Document and communicate incident findings, ensuring a clear and concise record of the investigation

and resolution process.

LogRhythm Platform Management:

Manage and optimize the LogRhythm SIEM platform to ensure data collection, parsing, and

normalization are functioning effectively.

  • Develop and fine-tune correlation rules, detection use cases, and custom reports to improve detection

capabilities and reduce false positives.

  • Provide recommendations for system enhancements and adjustments based on findings from incidents

or emerging threats.

Threat Intelligence Integration:

  • Integrate and manage threat intelligence feeds within LogRhythm to enhance detection capabilities.
  • Analyse and correlate threat intelligence data with internal security logs to identify external and internal

threats in real-time.

Security Tool Configuration and Tuning:

  • Configure and tune security tools (firewalls, endpoint detection and response (EDR), intrusion

detection/prevention systems (IDS/IPS)) to optimize integration with the LogRhythm platform.

  • Work with the team to enhance detection rules and improve threat coverage based on new attack

techniques and tactics (e.g., MITRE ATT&CK framework).

Collaboration and Knowledge Sharing:

  • Collaborate with the L1 team, senior engineers, and other stakeholders in the security operations

lifecycle to ensure smooth and effective incident handling.

  • Provide mentoring and training to junior engineers and analysts in best practices for incident response

and SIEM platform usage.

  • Participate in security operations meetings, helping to continuously refine and improve processes.

Reporting and Compliance:

  • Assist in generating reports for security incident analysis, compliance audits, and management reviews.
  • Support internal and external audits, providing data, logs, and documentation as needed.
  • Help track security metrics and performance indicators to support security operations reporting.

Continuous Improvement and Research:

  • Stay updated on the latest trends in cybersecurity threats, vulnerabilities, and defense mechanisms to

enhance the teams capabilities.

  • Suggest improvements to the security monitoring processes and help implement new detection

technologies and methodologies.

Desired qualifications.

Technical Skills:

  • Advanced proficiency with LogRhythm SIEM platform (experience with other SIEM platforms like Splunk,

QRadar, or ArcSight is a plus).

  • In-depth understanding of network protocols (TCP/IP, DNS, HTTP, etc.), security devices (firewalls,

IDS/IPS, etc.), and endpoint security technologies (EDR, antivirus, etc.).

  • Hands-on experience with log analysis, data correlation, and incident investigation.
  • Familiarity with threat intelligence tools, data sources, and feeds.
  • Strong understanding of security frameworks, including MITRE ATT&CK, NIST, and OWASP.

  • Experience:

  • • Minimum of 26 years of experience in cybersecurity, IT security operations, or incident response.
  • • Prior experience in a Security Operations Center (SOC) or handling security incidents in an enterprise
  • environment.
  • • Experience with security monitoring, SIEM platform tuning, and threat detection engineering.
  • Soft Skills:
  • • Strong analytical, problem-solving, and troubleshooting skills.
  • • Excellent communication skills, with the ability to clearly explain complex technical concepts to both
  • technical and non-technical stakeholders.
  • • Ability to work well under pressure and in a fast-paced environment, managing multiple tasks effectively.

NP-Immediate to 60 Days

Apply relevant candidates only

Walk in drive on 1st Nov'25

No C2H(Contract) or Third party Candidates only permanent Candidates