Splunk Engineer Job at Development InfoStructure, Virginia

L3J5dG5NbkhKRkl6ODRPdEpGMjFnTFBCaGc9PQ==
  • Development InfoStructure
  • Virginia

Job Description

Celebrating our 30th year as a successful Small Business, Development InfoStructure LLC., (DEVIS) provides exceptional DevSecOps integration in our agile software development and embedded software solutions, combined with comprehensive IT management and consulting services to our federal, state, and local governments. The outcomes of our research and development, products and universe of services will support the international development community, multiple civilian agencies and the nation’s defense and intelligence communities. Our focused research, services and products include complex DevSecOps solutions to support refugee processing across multiple federal agencies, research and development for Signal Intelligence (SIGINT), Command, Control, Communications, Computers and Intelligence (C4I), Data Analytics, and Intelligence, Surveillance and Reconnaissance (ISR) development and sensor capabilities supporting both the aerospace/defense and intelligence communities, as well as complex HHS comprehensive care coding requirements, and integrated management systems for our countries civilian agencies (FAA, FDIC, HOR, etc.).

Our primary mission is to best serve the needs of our clients by solutioning with our stakeholder teams to ensure that the goals and objectives of our customers are proactively solutioned, such that opportunities to invest our time in developing long-term solutions and assets are abundant and move our clients forward efficiently.

At DEVIS, we are enthusiastic about our research, our work and embracing an environment where all are supported in the mission, while maintaining a healthy work-life balance.

Overview

In this role, you will design, implement, deploy, and manage complex Splunk environments for a highly complex Department of State organization.   You will customize Splunk to meet specific use cases and requirements. You will develop and maintain Splunk dashboards and create reports tailored to the needs of different teams and stakeholders. You will be in charge of monitoring indexing performance, search performance, and data ingest. You will have to be proactive in identifying and resolving Splunk system and performance issues. You will analyze and conduct research to determine a cyber criminal’s capabilities, intentions, and attack approaches, including those with multiple phases. In addition, you will be responsible for supporting the remediation of any discovered threats and providing incident response capabilities when necessary.

This role will require you to stay up to date with the latest Splunk features, enhancements, and industry trends and manage relationships with Splunk vendors to stay informed about new products and offerings.


Responsibilities

  • Create, manage, and support automation solutions for Splunk orchestration.
  • Use the SIEM, EDR, IDS, and other tools to conduct cyber threat hunts.
  • Rapidly respond to incidents to minimize risk exposure and ensure system availability; proactively monitor internal and external-facing environments.
  • Identify attacker tools, tactics, and procedures to develop indicators of compromise.
  • Form and articulate expert opinions based on findings and analysis.
  • Seek opportunities to automate detection and remediation and reduce response times for incidents.
  • Provide incident response support and coordination, including investigating security incidents and coordinating with other teams to contain and remediate the incident.
  • Leverage Splunk to create advanced search queries and reports to monitor system performance, security threats, and operational metrics.
  • Collaborate and support inquiries from cross-functional internal and external stakeholders such as system administrators, compliance, and data engineering teams, to ensure documentation is complete and in compliance with information security policies.
  • Manage and support the development of security operations playbooks to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats.
  • Evaluate third-party products and services to verify they meet security and compliance requirements.
  • Familiarity with log management, event correlation, and data analysis concepts.
  • Drive improvements in technical architecture, standards, and processes to meet company objectives and best security practices.
  • Develops technical solutions to verify compliance with required technical controls autonomously.
  • Present findings/reports to stakeholders on a weekly basis.
  • Perform log analyses, parsing, indexing, and analyzing machine data logs to extract actionable insights.
  • Perform upgrades and patch management to keep Splunk environments up-to-date and secure.
  • Design intuitive and customizable dashboards to visualize data trends.



 

Desired Skills:

  • Experience in building Splunk Technology Add-ons and configuring field extractions for various data sources.
  • Strong experience working with Splunk, including architecting and implementing Splunk solutions in large-scale environments.
  • Proficiency in SPL (Search Processing Language) for creating complex queries, reports, and dashboards in Splunk.
  • Experience in designing, developing, testing, troubleshooting, deploying, and maintaining Splunk solutions, reporting, alerting, and dashboards.
  • Extensive knowledge of a tier Splunk installation: indexers, forwarders, search heads, and clusters.
  • Experience analyzing system, network, and application logs for attack techniques at all stages of the cyber kill chain.
  • Experience with more than one or more enterprise-scale EDR and SIEM tool.
  • Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways.
  • Strong analytical and critical thinking skills to identify and address complex data and system issues.
  • Strong problem-solving skills to investigate and resolve Splunk platform and data ingestion issues.
  • Strong communicator and collaborator, able to work closely with cross-functional teams.
  • Knowledgeable in using scripting languages (e.g., Python) and Splunk's built-in scripting to automate routine tasks.
  • Detail-oriented with a strong commitment to documenting configurations, processes, and best practices.
  • Familiarity with ServiceNow cloud offering and log ingestion to Splunk.
  • Experience with Puppet, Ansible, or other configuration management tools.
  • Previous Federal government experience.


Required Qualifications

Master's Degree with 5 to 7 years of experience; Equivalent combination of education, technical training and certification (CISSP, C|EH, GIAC GREM, GCTI, GCFR, GCFA, Splunk Certified Cybersecurity Defense Analyst, Splunk Enterprise Security Certified Admin) and/or work experience; knowledgeable about configuring Splunk for security and compliance requirements, including FISMA, SOC 2, HIPAA, and GDPR. 



 

Clearance Requirements

Active Secret Clearance preferred 

 

Additional Perks/Benefits

  • Competitive salary compensation
  • 401k Retirement Contribution Savings Plan



 

Devis is an AA/EOE/M/F/Disabled/VET Employer committed to providing equal employment opportunity without regard to an individual’s race, color, religion, age, gender, sexual orientation, veteran status, national origin or disability.

Job Tags

Full time, Work experience placement, Local area,

Similar Jobs

Embassy Suites Atlanta/Sugarloaf, GA

Guest Service Representative (WEEKENDS 3-11pm or Midshift) Job at Embassy Suites Atlanta/Sugarloaf, GA

 ...accommodating Document any guest accidents by completing the accident report form Ability and flexibility to work various shifts including evenings, weekends, and holidays Education/Experience High School diploma or GED preferred One year hospitality experience... 

Barclays Bank PLC

Vice President - Barclays Internal Audit Credit Risk Job at Barclays Bank PLC

Join us as a Vice President-Barclays Internal Audit Credit Risk, where youll lead end-to-end audit processes, assess key risks and controls, and ensure the successful delivery of the BIA Audit Plan. This role involves building strong stakeholder relationships, mentoring...

Phoenix Home Care and Hospice

Hospice CNA/HHA Job at Phoenix Home Care and Hospice

 ...Seeking a Hospice Home Health Aide in the Wichita, KS area. Soar with team Phoenix! Phoenix Home Care came to be as a result of our...  ...beginnings that drives the team at Phoenix Home Care. Now accepting CNA's - must be willing to obtain HHA certification! Availability... 

Buehler's Fresh Foods

Online Shopper - Part-Time Job at Buehler's Fresh Foods

 ...We hope you would consider the opportunity below! Online Shopper: Customer Service Clerk working on the store's Frontend and responsible...  ...of tasks either prior to or during regular store hours. This person's primary duties include working the Click Load & Go Department... 

Triangle Manufacturing

EDM Operator 1st Shift Job at Triangle Manufacturing

 ...people's lives. SUMMARY Coordinates and/or performs all activities related to the operation and maintenance of the companys EDM equipment to maximize utilization and meet customer requirements of on-time delivery and quality, while adhering to the Quality Management...