
Senior Security Engineer (SIEM/Cribl) at GuidePoint Security. Location Information: USA - Central,USA - East. About the Role. We are seeking an experienced and highly skilled . Senior SIEM / Cribl Engineer. to join our cybersecurity team. In this role, you will lead the design, implementation, and optimization of Security Information and Event Management (SIEM) systems and observability pipelines across a variety of modern toolsets. This position is remote, but preference will be given to candidates located on the U.S. East Coast to align with team collaboration and customer support hours.. Key responsibilities:. Architect, implement, and maintain SIEM solutions with a focus on modern platforms including:. Splunk. Elastic. Microsoft Sentinel. Google SecOps / Chronicle. CrowdStrike NG-SIEM. LogScale. Design and manage log ingestion pipelines using tools such as . Cribl Stream, Edge, or Search. (or similar).. Optimize data routing, enrichment, and filtering to improve SIEM efficiency and cost control.. Collaborate with cybersecurity, DevOps, and cloud infrastructure teams to integrate log sources and telemetry data.. Develop custom parsers, dashboards, correlation rules, and alerting logic for security analytics and threat detection.. Maintain and enhance system reliability, scalability, and performance of logging infrastructure.. Provide expertise and guidance on log normalization, storage strategy, and data retention policies.. Lead incident response investigations and assist with root cause analysis leveraging SIEM insights.. Mentor junior engineers and contribute to strategic security monitoring initiatives.. Required experience:. 5+ years of experience in security engineering, with a primary focus on SIEM platforms.. Hands-on experience with at least two of the following SIEM platforms:. Splunk. Elastic. Microsoft Sentinel. Google SecOps. CrowdStrike NG-SIEM. LogScale. 2+ years of experience with . Cribl. or similar observability pipeline tools (e.g., Logstash, Fluentd, Kafka).. Strong knowledge of log formats, data normalization, and event correlation.. Familiarity with detection engineering, threat modeling, and MITRE ATT&CK framework.. Proficiency with scripting (e.g., Python, PowerShell, Bash) and regular expressions.. Deep understanding of logging from cloud (AWS, Azure, GCP) and on-prem environments.. Preferred:. SIEM certifications. Cribl Certified Administrator or Architect credentials.. Experience with log ingestion from EDR, NDR, firewall, and cloud-native sources.. Familiarity with Kubernetes, serverless architectures, and containerized logging.. Experience supporting enterprise-scale security operations centers (SOCs).