Job Openings
Manager - Security Engineering & AI Operations
About the job Manager - Security Engineering & AI Operations
Role Summary
The Manager Security Engineering & AI Operations will lead the Platform Security Engineering team responsible for designing, implementing, optimizing, and innovating across multiple SIEM platforms, including Microsoft Sentinel, FortiSIEM, and Splunk. This role focuses on enhancing detection engineering, automation, and AI-driven capabilities within the SOC to strengthen threat detection, improve operational efficiency, and optimize platform performance.
Job Description
- Platform Engineering & Optimization
- Lead the design, deployment, and optimization of Microsoft Sentinel, FortiSIEM, and Splunk environments
- Oversee log onboarding, parsing, normalization, enrichment, and retention strategies to ensure optimal visibility and cost efficiency
- Continuously refine data ingestion and connector configurations for high fidelity and reduced noise
- Implement best practices for platform health, scalability, and high availability
- Establish and maintain dashboards for platform monitoring, ingestion metrics, and performance reporting
- Detection Engineering & Threat Analytics
- Develop and manage advanced detection rules, correlation logic, and analytics across all SIEM platforms
- Oversee the rule lifecycle process creation, validation, tuning, and decommissioning to minimize false positives
- Implement and standardize use cases for different threat categories (e.g., insider threats, cloud abuse, identity compromise)
- Coordinate with SOC analysts to validate and enhance alert logic through feedback loops
- Maintain a robust Detection Use Case Repository mapped to frameworks like MITRE ATT&CK
- AI, Automation & Innovation
- Integrate AI and ML-driven analytics into detection and response workflows
- Leverage Microsoft Security Copilot, Sentinel Analytics, and FortiSIEM ML features to improve automation and insight generation
- Build and enhance SOAR (Security Orchestration, Automation, and Response) playbooks for automated response
- Drive initiatives for AI-assisted threat hunting, alert summarization, and anomaly detection
- Experiment with LLM-driven capabilities for query generation, enrichment, and threat summarization
- Leadership & Collaboration
- Lead and mentor the Platform Security Engineers, ensuring skill growth and technical excellence
- Collaborate with the SOC Manager, Threat Hunting, and Incident Response teams to align detection strategies with business risks
- Work closely with IT and Cloud teams to ensure log source coverage from on-prem, hybrid, and multi-cloud environments
- Drive a continuous improvement culture focused on innovation, efficiency, and measurable impact
- Governance, Reporting & Continuous Improvement
- Define key metrics to measure detection coverage, platform efficiency, and automation success
- Review and report on ingestion costs, rule performance, and alerting efficiency
- Ensure adherence to internal standards, documentation, and change management processes
- Evaluate emerging SIEM and AI technologies for potential adoption
Person Specification
- Bachelors Degree in Cybersecurity, Computer Science, Information Security, or related field
- Masters degree in Cybersecurity or AI-related field is an added advantage
- 05+ years in cybersecurity operations, including minimum 3 years in SIEM engineering or detection engineering
- Proven experience managing or leading a technical SOC engineering or detection team
- Strong hands-on experience with at least two of the following platforms:
- Microsoft Sentinel (KQL, workbooks, analytics, playbooks, data connectors)
- FortiSIEM (rules, aggregation policies, CMDB, analytics)
- Splunk Enterprise/Splunk Cloud (SPL, dashboards, data models, Enterprise Security) - Experience in AI/ML integration, SOAR automation, or UEBA solutions is preferred
- Good understanding of MITRE ATT&CK, NIST CSF, and incident response frameworks
- Familiarity with Azure, GCP, and AWS security controls and log sources