Splunk Engineer Job at Development InfoStructure, Virginia

bFpKTFFuTWNMSU5XZHhPdjh2T1hZSVQ2Snc9PQ==
  • Development InfoStructure
  • Virginia

Job Description

Celebrating our 30th year as a successful Small Business, Development InfoStructure LLC., (DEVIS) provides exceptional DevSecOps integration in our agile software development and embedded software solutions, combined with comprehensive IT management and consulting services to our federal, state, and local governments. The outcomes of our research and development, products and universe of services will support the international development community, multiple civilian agencies and the nation’s defense and intelligence communities. Our focused research, services and products include complex DevSecOps solutions to support refugee processing across multiple federal agencies, research and development for Signal Intelligence (SIGINT), Command, Control, Communications, Computers and Intelligence (C4I), Data Analytics, and Intelligence, Surveillance and Reconnaissance (ISR) development and sensor capabilities supporting both the aerospace/defense and intelligence communities, as well as complex HHS comprehensive care coding requirements, and integrated management systems for our countries civilian agencies (FAA, FDIC, HOR, etc.).

Our primary mission is to best serve the needs of our clients by solutioning with our stakeholder teams to ensure that the goals and objectives of our customers are proactively solutioned, such that opportunities to invest our time in developing long-term solutions and assets are abundant and move our clients forward efficiently.

At DEVIS, we are enthusiastic about our research, our work and embracing an environment where all are supported in the mission, while maintaining a healthy work-life balance.

Overview

In this role, you will design, implement, deploy, and manage complex Splunk environments for a highly complex Department of State organization.   You will customize Splunk to meet specific use cases and requirements. You will develop and maintain Splunk dashboards and create reports tailored to the needs of different teams and stakeholders. You will be in charge of monitoring indexing performance, search performance, and data ingest. You will have to be proactive in identifying and resolving Splunk system and performance issues. You will analyze and conduct research to determine a cyber criminal’s capabilities, intentions, and attack approaches, including those with multiple phases. In addition, you will be responsible for supporting the remediation of any discovered threats and providing incident response capabilities when necessary.

This role will require you to stay up to date with the latest Splunk features, enhancements, and industry trends and manage relationships with Splunk vendors to stay informed about new products and offerings.


Responsibilities

  • Create, manage, and support automation solutions for Splunk orchestration.
  • Use the SIEM, EDR, IDS, and other tools to conduct cyber threat hunts.
  • Rapidly respond to incidents to minimize risk exposure and ensure system availability; proactively monitor internal and external-facing environments.
  • Identify attacker tools, tactics, and procedures to develop indicators of compromise.
  • Form and articulate expert opinions based on findings and analysis.
  • Seek opportunities to automate detection and remediation and reduce response times for incidents.
  • Provide incident response support and coordination, including investigating security incidents and coordinating with other teams to contain and remediate the incident.
  • Leverage Splunk to create advanced search queries and reports to monitor system performance, security threats, and operational metrics.
  • Collaborate and support inquiries from cross-functional internal and external stakeholders such as system administrators, compliance, and data engineering teams, to ensure documentation is complete and in compliance with information security policies.
  • Manage and support the development of security operations playbooks to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats.
  • Evaluate third-party products and services to verify they meet security and compliance requirements.
  • Familiarity with log management, event correlation, and data analysis concepts.
  • Drive improvements in technical architecture, standards, and processes to meet company objectives and best security practices.
  • Develops technical solutions to verify compliance with required technical controls autonomously.
  • Present findings/reports to stakeholders on a weekly basis.
  • Perform log analyses, parsing, indexing, and analyzing machine data logs to extract actionable insights.
  • Perform upgrades and patch management to keep Splunk environments up-to-date and secure.
  • Design intuitive and customizable dashboards to visualize data trends.



 

Desired Skills:

  • Experience in building Splunk Technology Add-ons and configuring field extractions for various data sources.
  • Strong experience working with Splunk, including architecting and implementing Splunk solutions in large-scale environments.
  • Proficiency in SPL (Search Processing Language) for creating complex queries, reports, and dashboards in Splunk.
  • Experience in designing, developing, testing, troubleshooting, deploying, and maintaining Splunk solutions, reporting, alerting, and dashboards.
  • Extensive knowledge of a tier Splunk installation: indexers, forwarders, search heads, and clusters.
  • Experience analyzing system, network, and application logs for attack techniques at all stages of the cyber kill chain.
  • Experience with more than one or more enterprise-scale EDR and SIEM tool.
  • Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways.
  • Strong analytical and critical thinking skills to identify and address complex data and system issues.
  • Strong problem-solving skills to investigate and resolve Splunk platform and data ingestion issues.
  • Strong communicator and collaborator, able to work closely with cross-functional teams.
  • Knowledgeable in using scripting languages (e.g., Python) and Splunk's built-in scripting to automate routine tasks.
  • Detail-oriented with a strong commitment to documenting configurations, processes, and best practices.
  • Familiarity with ServiceNow cloud offering and log ingestion to Splunk.
  • Experience with Puppet, Ansible, or other configuration management tools.
  • Previous Federal government experience.


Required Qualifications

Master's Degree with 5 to 7 years of experience; Equivalent combination of education, technical training and certification (CISSP, C|EH, GIAC GREM, GCTI, GCFR, GCFA, Splunk Certified Cybersecurity Defense Analyst, Splunk Enterprise Security Certified Admin) and/or work experience; knowledgeable about configuring Splunk for security and compliance requirements, including FISMA, SOC 2, HIPAA, and GDPR. 



 

Clearance Requirements

Active Secret Clearance preferred 

 

Additional Perks/Benefits

  • Competitive salary compensation
  • 401k Retirement Contribution Savings Plan



 

Devis is an AA/EOE/M/F/Disabled/VET Employer committed to providing equal employment opportunity without regard to an individual’s race, color, religion, age, gender, sexual orientation, veteran status, national origin or disability.

Job Tags

Full time, Work experience placement, Local area,

Similar Jobs

The Grapevine Agency

Executive Assistant to CEO of Tech Start Up Job at The Grapevine Agency

 ...Executive Assistant to CEO/Founder for Tech Start Up Torrance, CA Work Hours 9am 6pm Salary up to 125K DOE plus Full Benefits and Unlimited PTO A dynamic and visionary CEO/Founder of a rapidly growing tech startup, is seeking an exceptionally organized, proactive... 

Hines & Associates Inc

Utilization Review LPN Job at Hines & Associates Inc

Description: LPNs are you looking for a change? Want to work no nights, no weekends, and no holidays? Be able to work from home 50% of the time once trained? Check out Hines & Associates! ABOUT US: Hines is a nationwide, independent leader in personalized...

Raising Cane's Chicken Fingers

Assistant General Manager Job at Raising Cane's Chicken Fingers

 ...includes both inside and outside work in varied temperatures, working with and around food products, common allergens, industrial equipment, commercial cleaning products that require the use of personal protective equipment and physical activities necessary to complete the... 

Alamo Capital

Municipal Bond Trader Job at Alamo Capital

Alamo Capital - Municipal Bond Trader We are looking for a Municipal Bond Trader with at least 2 years of experience to join our fast-paced and innovative trading desk. Alamo Capital is a Woman Business Enterprise that has been providing full Broker-Dealer services since...

BayOne Solutions

Email Marketing Specialist Job at BayOne Solutions

 ...Job Title: US Site & Email Marketing Specialist &##128205; Location: Hybrid (Plaza preferred) or Remote (ideal candidate)&##128197; Duration: 6 Months with possible extension Were looking for a Site & Email Marketing Specialist to execute top-tier email campaigns...