Job Title:  Associate Director | Security Information and Event Management (SIEM) | Bengaluru | Cyber Defense &

Job requisition ID ::  89685
Date:  Sep 30, 2025
Location:  Bengaluru
Designation:  Associate Director
Entity:  Deloitte Touche Tohmatsu India LLP

Associate Director | Security Information and Event Management (SIEM) | Bengaluru | Cyber Defense & Resilience

Role Overview

We are seeking an experienced SIEM Architect / Implementation Subject Matter Expert (SME) to lead the design, deployment, and optimization of Security Information and Event Management (SIEM) solutions. The role demands deep technical expertise across multiple SIEM platforms, proven implementation experience, and the ability to align security monitoring capabilities with business and compliance requirements.

The ideal candidate will serve as both an architect and hands-on SME, capable of designing scalable SIEM architectures, integrating diverse log sources, developing advanced detection content, and enabling automation for efficient security operations.

Key Responsibilities

  • Architecture & Design
  • Design scalable and resilient SIEM architectures for enterprise and multi-tenant environments.
  • Define log ingestion strategies, retention models, and data normalization frameworks.
  • Map SIEM use cases to MITRE ATT&CK, threat models, and compliance requirements.
  • Implementation & Deployment
  • Lead SIEM deployment and configuration, including onboarding of log sources, parser development, and connector tuning.
  • Build custom dashboards, correlation rules, alerts, and automated playbooks to enhance detection and response.
  • Ensure integration with SOAR, threat intelligence platforms, and other security ecosystem tools.
  • Optimization & Use Case Development
  • Optimize SIEM performance and cost efficiency (data ingestion, storage, and processing).
  • Develop and continuously improve detection content to reduce false positives and enhance alert fidelity.
  • Automate routine monitoring tasks to reduce analyst workload.
  • Stakeholder Engagement
  • Work closely with SOC, incident response, and compliance teams to align SIEM capabilities with operational needs.
  • Act as SME during workshops, POCs, and vendor evaluations.
  • Provide documentation, training, and knowledge transfer to operations teams.
  • Governance & Best Practices
  • Establish SIEM onboarding standards, parser frameworks, and governance models.
  • Define and enforce best practices for use case lifecycle management.
  • Stay up to date with next-generation SIEM capabilities (AI/ML detection, UEBA, cloud-native SIEM, XDR).

Qualifications & Skills

  • Education & Certification
  • Bachelor’s degree in Computer Science, Cybersecurity, or related field.
  • Preferred certifications: SIEM vendor certifications (Splunk Architect, Microsoft Sentinel, Chronicle, XSOAR/XSIAM, QRadar, etc.), CISSP, CISM, GIAC (GCIA, GCDA).
  • Technical Expertise
  • 8+ years of experience in SIEM architecture, deployment, and optimization.
  • Hands-on expertise with at least two SIEM platforms (e.g., Microsoft Sentinel, Google Chronicle/SecOps, Splunk, Palo Alto XSIAM, IBM QRadar).
  • Strong knowledge of log ingestion pipelines, data parsing, and custom parser development.
  • Experience with cloud-native SIEMs, log analytics, and big data platforms.
  • Familiarity with SOAR platforms, scripting (Python, PowerShell, Regex), and automation frameworks.
  • Security Domain Knowledge
  • Deep understanding of security monitoring, detection engineering, threat hunting, and incident response.
  • Strong knowledge of MITRE ATT&CK, NIST, ISO27001, and regulatory compliance frameworks.
  • Exposure to EDR, NDR, UEBA, and threat intelligence integrations.
  • Soft Skills
  • Strong stakeholder management and communication skills.
  • Ability to lead technical workshops, mentor teams, and influence at senior levels.
  • Problem-solving mindset with focus on scalability and efficiency.