Costco Job, Costco Hiring Remote Jobs @sarkariexamupdate (Cybersecurity SIEM Engineer)

Full Time26-Jun-2023
Overview

Firm Name: Costco

Numbers of Jobs: Cybersecurity SIEM Engineer

Education Need: Graduate

Job Hours: 8

Payment: $20-$30/Hour

What's Job City: Seattle

Job Details:

Because of the unique nature of this environment in the high-tech world, Costco's culture is the secret to its success. The value that Costco places on its employees is amply documented in articles from a variety of publishers, including Bloomberg and Forbes. Our team members and employees are given priority. Known for its generosity and dedication to the community as a result of its philanthropy, Costco has a strong reputation. The company offers a variety of charitable giving opportunities to encourage its employees to volunteer actively. More than $58 million was donated by Costco to organizations like the United Way and Children's Miracle Network Hospitals in 2021. 
 
 Costco IT is responsible for ensuring the technical viability of the company. Costco is the third-largest retailer in the world with wholesale operations in fourteen countries. We maintain a family-oriented culture that fosters success for all of our employees despite the size of our business and our rapid international growth. In support of this claim, consider Costco's ranking of seventh among the world's best employers on Forbes' list. 
 
 The Cybersecurity SIEM Engineer will integrate additional technologies and platforms while designing, implementing, and managing a Splunk SaaS SIEM as part of the Logging and Detection Engineering team. 
 
 If you want to be a part of one of the world's BEST companies "to work for," all you have to do is apply and let your career be reimagined. ". 
 
 ROLE. 
 

  •  creates original Splunk applications to assist the department's other SOC-related teams. 
  •  
  •  develops distinctive detections to identify and alert to threat actor activity. 
  •  
  •  Python code that has been specially written can be used to integrate applications with cloud technologies like Event Hubs. 
  •  
  •  other Splunk and non-Splunk environments into a global SIEM. 
  •  
  •  creates a roadmap for innovation, maturity enhancements, and logging gap closure. 
  •  
  •  helps the enterprise monitoring team integrate platforms seamlessly. 

 
 REQUIRED. 

 

  •  at least three of the previous five years must have been spent working directly with Splunk applications. 
  •  
  •  a working understanding of data models, Splunk, and how they relate to SIEMs. 
  •  
  •  knowledge of programming and scripting languages. Python knowledge is preferred. 
  •  
  •  working knowledge of DevOps or DevSecOps environments for software development. 
  •  
  •  solid working knowledge of OAUTH, SAML, and Kerberos as well as other authentication protocols. 
  •  
  •  Microsoft Windows and GNU/Linux proficiency. 
  •  
  •  extensive familiarity with web technologies, cloud computing, and networking protocols. 
  •  
  •  flexibility in scheduling to meet the needs of the business, including on weekends, holidays, and in the evenings. 

 
 Recommended. 

  •  the ability to mentor and coach other Splunk users. 
  •  
  •  Splunk certifications, at least one. 
  •  
  •  or more than one SANS certification. 
  •  
  •  an accentuation of teamwork and customer needs. 
  •  
  •  intense attention to detail. 

 
 Documentation is needed. 
 

  •  Letter of Introduction. 
  •  
  •  The CV.