Wazuh SIEM Expert Needed for Threat Intelligence
Summary
Freelancer Client is hiring: Wazuh SIEM Expert Needed for Threat Intelligence.
Location: Remote
Compensation: $50.00 – $100.00 USD Delivery Timeline: Strictly 1 Day (24 Hours from post)
Wazuh SIEM Expert Needed for Threat Intelligence
I need an experienced cybersecurity engineer or SIEM specialist to immediately configure and document Threat Intelligence Integration into a Wazuh SIEM environment. This is a straightforward technical task but carries a strict 24-hour deadline.
You must configure the integration of three (3) external threat intelligence sources (e.g., AlienVault OTX, VirusTotal, AbuseIPDB, MISP, YETI, or similar open-source feeds).
Integration Setup: Configure the ingestion method (API integration, ThreatIntel module, or URL/CDB list feed ingestion) inside the Wazuh Manager.
Configuration Steps: Provide the exact configuration snippets added to the Wazuh Manager (e.g., blocks in ossec.conf or custom integration scripts).
Skills: Compliance, Risk Management, Virtual Machines, Documentation, Alerting, Data Analysis, Network Security, Certified Ethical Hacking, Event Management
Source: Freelancer Client via Remote / Online. Apply on the source website.
Original
Wazuh SIEM Expert Needed for Threat Intelligence
I need an experienced cybersecurity engineer or SIEM specialist to immediately configure and document Threat Intelligence Integration into a Wazuh SIEM environment. This is a straightforward technical task but carries a strict 24-hour deadline.
Scope of Work & Deliverables
You must configure the integration of three (3) external threat intelligence sources (e.g., AlienVault OTX, VirusTotal, AbuseIPDB, MISP, YETI, or similar open-source feeds).
For each of the three sources, you must deliver:
Integration Setup: Configure the ingestion method (API integration, ThreatIntel module, or URL/CDB list feed ingestion) inside the Wazuh Manager.
Configuration Steps: Provide the exact configuration snippets added to the Wazuh Manager (e.g., blocks in ossec.conf or custom integration scripts).
Verification Evidence: Documentation/clear visual indicators showing that the integration is actively working within the Wazuh manager.
Additionally, you must provide Verification of Usage:
Demonstrate exactly how the threat intelligence data is applied in the environment.
Show an event lookup or triggered alert where Wazuh successfully matches network traffic, IP data, or file hashes against the TI feed (active log enrichment/threat matching).
Budget: $50.00 – $100.00 USD Delivery Timeline: Strictly 1 Day (24 Hours from post)
Location & Details
Apply on source →About this listing
This remote opportunity was imported from Freelancer and is shown here for discovery. To apply, follow the link to the original posting.