Cybersecurity Engineer at Ford Motor Company
Dearborn, MI 48124, USA -
Full Time


Start Date

Immediate

Expiry Date

23 Nov, 25

Salary

0.0

Posted On

23 Aug, 25

Experience

2 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Christmas, Adoption

Industry

Information Technology/IT

Description

We are the movers of the world and the makers of the future. We get up every day, roll up our sleeves and build a better world - together. At Ford, we’re all a part of something bigger than ourselves. Are you ready to change the way the world moves?
Enterprise Technology plays a critical part in shaping the future of mobility. If you’re looking for the chance to leverage advanced technology to redefine the transportation landscape, enhance the customer experience, and improve people’s lives, this is the opportunity for you. Join us and challenge your IT expertise and analytical skills to help create vehicles that are as smart as you are.
This position will be involved in developing/engineering SIEM/SOAR and unified security & risk management solutions across the current and future security portfolio, with a strong initial focus on Google SecOps and Security Command Center. The ideal candidate should have experience configuring, managing, and optimizing Google SecOps and Security Command Center to support a mature SOC. This role involves working closely with IT security teams to enhance our security posture while ensuring compliance with industry standards and best practices.

Responsibilities
  • SIEM Solution Design and Implementation :
  • Designing and deploying secure, scalable Google SecOps architectures, including log ingestion pipelines and integration with existing IT infrastructure
  • Configuring and managing log ingestion from various sources, ensuring data normalization and efficient analysis within Google SecOps.
  • Design, Build, and Maintain SIEM Data Pipelines :
  • Design and develop robust, scalable, and automated data pipelines to ingest, process, transform, and store security logs and events from diverse sources (e.g., servers, firewalls, applications, cloud platforms) into the SIEM platform.
  • Develop and implement data parsing rules, enrichment processes, and data normalization techniques to ensure data quality and consistency within the SIEM.
  • Integrate new data sources into the SIEM, including connecting to APIs, databases, streaming data sources, and cloud platforms.
  • Collaborate with various teams (e.g., development, operations, cloud services) to understand logging requirements, define logging standards, and ensure the appropriate data is collected.
  • Optimize SIEM Data Pipelines :
  • Monitor data pipeline performance, identify bottlenecks, and implement optimizations to improve efficiency, reduce latency, and ensure timely data availability for security analysis.
  • Tune log sources and correlation rules to reduce false positives, minimize noise, and enhance the accuracy of threat detection.
  • Develop and implement best practices for SIEM and SOAR (Security Orchestration, Automation, and Response) content management and development.
  • Explore and implement automation opportunities to improve analyst alert handling, streamline security operations, and reduce manual intervention.
  • SIEM Administration and Support :
  • Maintain the health, performance, and tuning of the SIEM platform.
  • Troubleshoot issues related to log sources, data ingestion, parsing failures, and other SIEM platform issues.
  • Security Command Center (SCC) responsibilities :
  • Managing access to Security Command Center features through IAM roles, allowing granular control over who can view, edit, or manage findings and assets
  • Ensuring that Security Command Center settings are configured and maintained to support the organization’s security needs.
  • Connecting with other Google Cloud products and third-party tools for a more complete security posture
Loading...