About Vijilan Security
Vijilan Security provides 24/7 cybersecurity monitoring, detection, response, and managed security operations for MSPs, MSSPs, and enterprise partners. We work closely with leading technology providers, including CrowdStrike, Cribl, and other modern security platforms, to help organizations improve visibility, detection, and response across their environments.
We are looking for someone who understands log management, SIEM technologies, and data pipelines. Training will be provided, especially around CrowdStrike Falcon Next Gen SIEM implementation, LogScale, Cribl, Onum, and Vijilan’s internal processes.
Position Overview
Vijilan is seeking a motivated Log Management and SIEM Solutions Engineer to support the implementation, onboarding, and optimization of modern SIEM and data management solutions.
The ideal candidate has experience with log collection, data parsing, normalization, dashboards, detection rules, and troubleshooting log flow issues. Experience with platforms such as Splunk, Elastic, LogScale, or similar technologies is highly valuable.
Knowledge of Cribl and Onum is considered invaluable, as Vijilan continues to expand its data ingestion, routing, transformation, and observability capabilities.
Key Responsibilities
- Work with Vijilan’s internal teams, partners, and customers to implement log management and SIEM solutions.
- Support CrowdStrike Falcon Next Gen SIEM and LogScale implementation projects.
- Assist with log source onboarding, data ingestion, parsing, normalization, and validation.
- Build and validate dashboards, widgets, workflows, correlation rules, and detection content.
- Troubleshoot log collection, data flow, parsing, and SIEM implementation issues.
- Support data pipeline technologies such as Cribl, Onum, or similar tools used for log routing, enrichment, filtering, and transformation.
- Collaborate with SOC, professional services, development, and customer facing teams to improve onboarding and managed services delivery.
- Document implementation steps, technical findings, lessons learned, and customer specific configurations.
- Participate in partner and customer work sessions, follow up meetings, and technical discussions.
- Provide internal training and knowledge transfer to team members when needed.
- Stay current with SIEM, log management, data pipeline, and cybersecurity technologies.
Required Qualifications
- Experience with log management, SIEM technologies, or security data platforms.
- Understanding of log collection methods such as syslog, API, agents, cloud connectors, CEF, JSON, and other common formats.
- Familiarity with SIEM concepts, including event normalization, correlation, alerting, dashboards, and detection logic.
- Hands on experience with tools such as Splunk, Elastic, LogScale, QRadar, Sentinel, or similar platforms.
- Strong troubleshooting skills related to data ingestion, parsing, log flow, and platform configuration.
- Ability to communicate clearly in English, both written and verbal.
- Ability to work independently and collaboratively in a remote team environment.
- Strong attention to detail and willingness to learn new technologies.
Preferred Skills
- Experience with CrowdStrike Falcon Next Gen SIEM or CrowdStrike LogScale.
- Experience with Cribl Stream.
- Experience with Onum.
- Experience supporting MSPs, MSSPs, SOC teams, or managed security service environments.
- Understanding of cybersecurity operations, detection engineering, and SOC workflows.
- Experience creating dashboards, detection rules, parsers, workflows, or customer facing technical documentation.
- Knowledge of cloud security log sources such as Microsoft 365, Entra ID, AWS, GCP, Azure, Okta, or similar platforms.
- Spanish or Portuguese language skills are a plus.
- Relevant certifications in cybersecurity, SIEM, cloud, log management, or data engineering are a plus.
Training Provided
- CrowdStrike Falcon Next Gen SIEM implementation.
- CrowdStrike LogScale.
- Vijilan onboarding methodology.
- Cribl and data pipeline workflows.
- Onum and modern telemetry pipeline concepts.
- SOC use cases and managed detection requirements.
- Internal tools, documentation, and implementation standards.
What We Offer
- Competitive compensation.
- Preferred Miami on site project collaboration, with travel support for the right candidate when needed.
- Approved project related travel expenses covered by Vijilan.
- Vendor training and cross training opportunities.
- Hands on experience with modern cybersecurity technologies.
- Opportunity to work with CrowdStrike, Cribl, Onum, and other leading platforms.
- Professional growth in SIEM, data engineering, SOC operations, and managed security services.
- Collaborative team environment with real ownership and visibility.
Vijilan Security is an equal opportunity employer. We value diversity and are committed to creating an inclusive environment for all employees.