Skip to content
mimi

SIEM Engineer

Zachary Piper

On-site Full-time Mid Level $165k – $195k/yr Today

About the role

About

Zachary Piper Solutions is currently seeking a SIEM Engineer to support a mission-critical federal cybersecurity program based in Newington, VA. This position is a full-time, onsite role supporting high-tempo, classified security operations. This role is critical in safeguarding enterprise networks and systems by ensuring accurate, reliable, and proactive security monitoring. As a SIEM Engineer, you will play a pivotal role in security monitoring, detection engineering, and continuous improvement of SOC capabilities, working closely with analysts, incident responders, and system engineers to protect sensitive assets.

Key Responsibilities

  • Collaborate with SOC analysts, incident responders, and system engineers to support mission-critical cybersecurity operations
  • Analyze and troubleshoot log ingestion pipelines, correlation rules, and alerting issues to improve detection fidelity and reduce false positives
  • Develop, maintain, and optimize SIEM use cases, correlation rules, dashboards, and alerts
  • Support proactive threat detection efforts in a fast-paced, team-oriented SOC environment
  • Utilize SIEM technologies such as Splunk Enterprise Security and IBM QRadar to aggregate, correlate, and analyze security event data
  • Investigate and correlate security events across multiple data sources during active incidents
  • Ensure SIEM content aligns with compliance and security framework requirements
  • Contribute to continuous improvement initiatives across detection engineering and SOC operations

Requirements

  • Active TS/SCI clearance
  • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field (or equivalent hands-on experience)
  • 3+ years of experience in SIEM engineering, cybersecurity monitoring, or security analytics
  • Hands-on experience with SIEM platforms (Splunk Enterprise Security, IBM QRadar)
  • Log management, event correlation, and alert tuning
  • Experience developing SIEM use cases and detection rules
  • Strong understanding of security logs: Windows and Linux systems, Firewalls, IDS/IPS, Cloud and infrastructure logs
  • Scripting experience with Python, Bash, or PowerShell
  • Working knowledge of networking protocols (TCP/IP, DNS, HTTP/S)
  • Understanding of cybersecurity frameworks (NIST, MITRE ATT&CK)
  • Strong analytical and problem-solving skills
  • Ability to investigate and correlate complex security events
  • Effective written and verbal communication skills
  • Ability to operate in a team-oriented, high-tempo SOC environment
  • Strong attention to detail with the ability to prioritize during incidents

Compensation

  • Salary Range: $165,000 – $195,000 depending on experience
  • Full Benefits: Medical, Dental, Vision, 401K, PTO, Sick Leave if Required by Law

Skills

BashCloud SecurityCybersecurityDetection EngineeringFirewallsIBM QRadarIDS/IPSIncident ResponseLinuxLog AnalysisMITRE ATT&CKNISTNetworkingNetworking ProtocolsNetwork SecurityNetwork Traffic AnalysisPacket CapturePowerShellPythonSecurity AnalyticsSecurity OperationsSIEMSplunkSplunk Enterprise SecuritySplunk SPLTCP/IPThreat DetectionThreat IntelligenceVulnerability AssessmentWiresharkWindows

Don't send a generic resume

Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.

Get started free