Job Description
Are you a skilled IT professional with expertise in Security Information and Event Management (SIEM), log engineering, and security rules development?
A unique opportunity has opened up for an experienced SIEM, Log Engineering, and Security Rules Development Expert to join a dynamic team. This position is ideal for individuals passionate about IT security and eager to contribute to protecting critical systems. Below is the detailed job description for this role.
Key Responsibilities
As a SIEM, Log Engineering, and Security Rules Development Expert, your role will be focused on enhancing and maintaining the organization’s security infrastructure. Below are some of the core duties you will be responsible for:
1. SIEM Management and Optimization: You will oversee the implementation, optimization, and management of SIEM systems, ensuring that they effectively collect, store, and analyze logs from various sources.
2. Log Engineering: Developing and managing log data systems, ensuring that logs are captured correctly and stored in a structured, accessible manner.
3. Security Rules Development: Designing, developing, and fine-tuning security rules within the SIEM system to detect potential security threats and vulnerabilities.
4. Incident Detection and Response: Helping to identify, investigate, and respond to security incidents by analyzing event logs and responding to alerts generated by the SIEM system.
5. Continuous Improvement: Regularly reviewing and improving security rules and log management strategies to ensure they remain effective against evolving threats.
6. Collaboration: Working closely with other departments, such as network security, to understand their requirements and ensure that the SIEM system is aligned with overall security goals.
Why Join the IT Department?
Working in the IT department, especially in the security domain, provides a unique opportunity to safeguard an organization’s digital assets and systems. As a SIEM, Log Engineering, and Security Rules Development Expert, you will play a critical role in maintaining the cybersecurity framework. Here’s why this role is important:
1. Protect Critical Systems: You will ensure that the organization’s IT infrastructure is protected from various security threats by managing logs and developing robust security rules.
2. Be at the Forefront of Cybersecurity: With the ever-increasing threat of cyberattacks, your work will directly contribute to protecting sensitive data and preventing data breaches.
3. Career Growth: Being part of a growing security team offers numerous opportunities for professional development, allowing you to stay updated on the latest security technologies and trends.
Skills and Qualifications Required
To excel in this role, you will need a combination of education, experience, and skills. Here are the qualifications needed for the position:
1. Education: A bachelor’s or higher degree in Computer Science, Software Engineering, or related fields, such as BE in Computer Science, BE in Software Engineering, BS in Computer Engineering, BS in Computer Science, or MPhil in Software Engineering.
2. Experience: A minimum of 7 years of work experience in IT security, specifically in SIEM management, log engineering, and security rule development, is required.
3. Skills: Proficiency in security systems and log management tools is essential. You should also have a strong understanding of incident response and security rules development.
Job Details and Additional Information
1. Contract Type: This is a contract position available until May 11, 2025.
2. Location: The job is based in Multan, Punjab, Pakistan.
3. Age Limit: Applicants should be under the age of 75 years.
4. Pay Scale: The position is categorized as a Consultant role.
5. Experience Required: At least 7 years of relevant work experience.
6. Application Requirements: Your CV should be at least 80% complete.
How to Apply
If you meet the qualifications and are excited about joining a reputable organization to strengthen its IT security, we encourage you to Apply at Growthify.Pk.
This opportunity allows you to contribute your skills to a vital aspect of IT security while advancing your career in a rapidly evolving field. Don’t miss out on this chance to make a difference!



