Wintrio LLC Log Management and SIEM Data Engineer Remote · Full time Company website

As a Log Management and SIEM Data Engineer, you will support log ingestion, parsing, normalization, retention, routing, reporting, and long-term storage across Microsoft Sentinel and related federal security monitoring environments. This role is critical to closing visibility gaps and improving the quality of data used for cyber monitoring and incident response.

About Wintrio LLC

WINTrio is an 8(a) and HUBZone organization with a successful record of delivering high-quality technical and professional services to federal and commercial customers including USCIS and Walmart. WINTrio manages and improves overall performance through IT Modernization practices. Our team of seasoned Cyber Security, Cloud/DevSecOps, software, and Support Experts helps your organization secure its digital environment with innovative and bleeding-edge technology solutions based on best practices and approved industry standards. We deliver a 360-degree spectrum of Systems Integration services from Inception to Project Delivery. At WINTrio we provide tailored customized services to meet all your business needs.

Description

Company Overview 

WINTrio LLC (WINTrio) is a leading provider of Cyber/DevSecOps, Cloud, Artificial Intelligence (AI)/Machine Learning (ML), and Agile Software Development solutions. We collaborate closely with federal and commercial clients to solve complex technical challenges by delivering innovative, agile, and cost-effective solutions. Our team is empowered to think creatively and deliver impactful results that drive measurable value. 

 

Role: Log Management and SIEM Data Engineer 

Location: Remote, with occasional onsite support as required 

Client: Long-term Federal/Public Sector 

Work Authorization: US Citizen or Green Card preferred; must be able to pass federal background and suitability requirements. 

Job Summary: 

As a Log Management and SIEM Data Engineer, you will support log ingestion, parsing, normalization, retention, routing, reporting, and long-term storage across Microsoft Sentinel and related federal security monitoring environments. This role is critical to closing visibility gaps and improving the quality of data used for cyber monitoring and incident response. 

Key Responsibilities: 

  • Support onboarding of Microsoft and non-Microsoft log sources into Microsoft Sentinel.  
  • Configure, validate, and troubleshoot log ingestion pipelines.  
  • Support ingestion from AWS CloudTrail, VPC Flow Logs, Entra ID, MDE, MDI, firewalls, VPN, Proofpoint, GitHub, SQL Server, iBoss, Veeam, and third-party systems.  
  • Monitor ingestion failures, forwarding interruptions, suppression, tampering, and pipeline health.  
  • Support log normalization, schema mapping, transformation, and routing.  
  • Support hot and cold storage log retrieval requirements.  
  • Assist with QRadar legacy log transition analysis where authorized.  
  • Document ingestion architecture, data flows, source mappings, field normalization, and retention settings.  
  • Work with SOC analysts and detection engineers to ensure log sources support high-value detection use cases.  

Required Qualifications: 

  • Bachelor’s degree in Computer Science, Information Systems, Cybersecurity, Data Engineering, or related field.  
  • 5+ years of SIEM, log management, data pipeline, security data engineering, or cloud telemetry experience.  
  • Hands-on experience with Microsoft Sentinel, Log Analytics, KQL, and SIEM data onboarding.  
  • Experience with AWS logging, network device logs, firewall logs, identity logs, endpoint logs, and SaaS logs.  
  • Understanding of log retention, audit readiness, evidence preservation, and security monitoring requirements.  
  • Strong troubleshooting skills across network, cloud, endpoint, and identity telemetry.  

Tools and Preferred Qualifications: 

  • Microsoft Sentinel, Azure Log Analytics, KQL, Azure Monitor, AWS CloudTrail, VPC Flow Logs.  
  • WinCollect, Checkpoint, Cisco, iBoss, Proofpoint, GitHub, SQL Server, Veeam, Cribl or similar tools.  
  • Certifications preferred: SC-200, AZ-500, AWS Security Specialty, Security+, CySA+, GCIA. 

 

Benefits 

  • Medical, Dental, and Vision Insurance 
  • FSA & HSA options 
  • 401(k) Retirement Plan 
  • Annual Bonus & Profit Sharing 
  • Paid Time Off (PTO) & Vacation 
  • Employee Assistance Program (EAP) 
  • Life & Disability Insurance 

 

Why Join WINTrio? 

WINTrio is a people-first, employee-driven organization. We offer opportunities to grow across emerging technologies, program management, and business development while working on high-impact federal initiatives. 

 

Equal Opportunity Employer 

WINTrio LLC is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration without regard to race, color, religion, sex, gender identity, national origin, age, veteran status, or disability. 

📩 Apply Now: https://www.wintrio.com/jobs/log-management-and-siem-data-engineer/

 

Salary

$10,000 - $300,000 per year