<p>Robert Half has a client seeking a Network Analyst. The ideal candidate for this position would have experience in small to medium environments and at least 3- 5 years of hands-on experience. This will be a temporary to full time opportunity that will be fully onsite. </p><p><br></p><ul><li>Manager layer 2/3 devices on the OSI </li><li>Support and troubleshoot Palo Alto Firewall and GlobalProtect VPN platforms</li><li>Configure/support Aruba wireless devices for remote site locations </li><li>Liaise with vendor support to manage maintenance planning and implementation (reactive and proactive) to minimize service disruption for Network Services</li><li>Deliver Network infrastructure development / build activities (managed by Project Managers), including release and deployment management for new services</li></ul>
We are looking for a skilled Security Engineer to join our team on a long-term contract basis in Irving, Texas. This role focuses on leading the implementation and configuration of advanced SIEM solutions, including CrowdStrike NG-SIEM, within a manufacturing environment. The ideal candidate will bring senior-level expertise, working independently to drive key initiatives while collaborating with infrastructure teams to ensure seamless onboarding and integration of logging systems.<br><br>Responsibilities:<br>• Lead the deployment and configuration of CrowdStrike NG-SIEM, ensuring effective implementation across the organization.<br>• Manage the onboarding and normalization of log sources from diverse systems, including Linux, Windows, and Cisco network devices.<br>• Develop ingestion pipelines, parsers, and detection rules to optimize data processing and security monitoring.<br>• Coordinate with internal teams to integrate systems and logging sources into the SIEM platform.<br>• Monitor and refine log ingestion architecture to enhance system performance and security.<br>• Create and customize log parsing pipelines to support normalization and efficient data analysis.<br>• Build detection rules and queries to identify potential threats and improve security posture.<br>• Configure syslog pipelines and event forwarding for infrastructure systems.<br>• Collaborate with stakeholders to design robust logging architectures tailored to business needs.<br>• Stay updated on industry best practices and emerging technologies to continuously improve SIEM solutions.