The average salary for jobs that require the skills of Security Information and Event Management (SIEM) Software is $170,235 based on United States National Average.
Core compensation
Responsible for determining enterprise information security policy and strategy. Oversees the development, implementation, and enforcement of information security standards and procedures. Ensures that all information systems are functional correctly regarding secure policy. In charge of IT risk evaluations, audits, and security incident investigation. Requires a bachelor's degree. Typically repor... View job details
Performs forensic analysis on computer systems and servers. Investigates cybersecurity incidents using digital forensic techniques and tools. Collects, preserves, and analyzes digital evidence. Recovers emails, databases, and other potentially lost or compromised data. Documents and reports on findings, and recommends next steps. Requires a bachelor's degree. Typically reports to a manager. Occasi... View job details
Performs forensic analysis on computer systems and servers. Investigates cybersecurity incidents using digital forensic techniques and tools. Collects, preserves, and analyzes digital evidence. Recovers emails, databases, and other potentially lost or compromised data. Documents and reports on findings, and recommends next steps. Helps evaluate the organization's digital forensic tools and procedu... View job details
Performs forensic analysis on computer systems and servers. Investigates cybersecurity incidents using digital forensic techniques and tools. Collects, preserves, and analyzes digital evidence. Recovers emails, databases, and other potentially lost or compromised data. Documents and reports on findings, and recommends next steps. Evaluates the organization's digital forensic tools and procedures a... View job details
Performs forensic analysis on computer systems and servers. Investigates cybersecurity incidents using digital forensic techniques and tools. Collects, preserves, and analyzes digital evidence. Recovers emails, databases, and other potentially lost or compromised data. Documents and reports on findings, and recommends next steps. Evaluates the organization's digital forensic tools and procedures a... View job details
Ensures that all system platforms are functional and secure. Works with upper management to determine acceptable level of risk for enterprise computing platforms. Requires a bachelor's degree. Typically reports to top management. Typically manages through subordinate managers and professionals in larger groups of moderate complexity. Provides input to strategic decisions that affect the functional... View job details
Manages the team responsible for investigating and responding to cyber incidents. Administers all aspects of technical incident response from initiation to conclusion. Assesses the nature of the incident and determines what resources are needed to resolve the situation. Manages and coordinates all efforts to contain and resolve the incident. Reviews reports and other documentation to make recommen... View job details
Oversees the team responsible for analyzing and responding to cyber incidents. Administers all aspects of technical incident response from initiation to conclusion. Assesses the nature of the incident and determines what resources are needed to resolve the situation. Manages and coordinates all efforts to contain and resolve the incident. Reviews reports and other documentation to recommend improv... View job details
Investigates, reports, and responds to detected cyber incidents. Maintains system cybersecurity monitoring operations, and performs cyber incident triage to determine scope, urgency, and potential impact of the incident. Identifies the specific vulnerability and makes recommendations for remediation. Proactively searches for threats using a variety of Computer Network Defense (CND) tools, includin... View job details
Investigates, reports, and responds to detected cyber incidents. Maintains system cybersecurity monitoring operations, and performs cyber incident triage to determine scope, urgency, and potential impact of the incident. Identifies the specific vulnerability and makes recommendations for remediation. Proactively searches for threats using a variety of Computer Network Defense (CND) tools, includin... View job details
Inform your career path by finding your customized salary.