Splunk Cybersecurity Solutions Engineer/Architect (Remote)
A.C. Coy
Overview
- Tier One Technologies is urgently seeking a Splunk Cybersecurity Solutions Engineer/Architect to work on a long-term project with our direct US Government client.
- This is going to be a 100% remote position.
- SELECTED CANDIDATES WITHOUT REQUIRED CLEARANCE WILL BE SUBJECT TO A FEDERAL GOVERNMENT BACKGROUND INVESTIGATION TO RECEIVE IT.
Responsibilities
- Develop and Implement Actionable Alerts and Workflow for Splunk as a SIEM (Security Information & Event Management) tool.
- Develop and Implement Apps & Knowledge Objects (KO) like Dashboard, Reports, Data Models.
- Work with the Splunk Architect/Admin to promote private KO to Global KO.
- Assist,Β and/or train CISO Splunk Engineering team on Data Lifecycle Support.
- Assist, train, and/or host workshops CISO teams and analysts on Searching and Content Development.
- Develop and implement automation to improve efficiency of CISO workflows using Splunk.
- Assist in development of advanced security use cases in Splunk.
- Develop risk rules and risk incident rules to correlate and alert to significant cyber events.
- Develop custom dashboards specific to RBA (Risk Based Alerting) to highlight risk detail, health analysis and risk suppression.
- Configure incident response and remediation workflows for ES around notable events (RBA or otherwise alerted).
- Develop custom machine learning (ML) models to support anomaly-detection based augmentation of alerting.
- Work with numerous stakeholders to implement & maintain events logging from various operating systems, applications, identity providers, network infrastructure, and cloud service providers.
- Responsible for tuning and configuration of Splunk Core and Splunk Enterprise Security (ES) services, develop use cases with CISO end users to build content and assist in developing advanced security use cases.
- Participate in requirements gathering, solutions architecting, design and build of technology solutions to support Continuous Monitoring Program. Assist, train, and host workshops for CISO teams.
- Support off-hours and weekend efforts for incident investigations and systems maintenance.
Qualifications
- Bachelorβs degree in Computer Science, Information Systems, or related field.
- 10+ years of IT related experience.
- Expertise in implementing dynamic detections, integrating alerting platforms with, but no limited to, Tanium, SEP, Microsoft Defender for endpoint, Sysmon, Microsoft O365 Security alerting, Analyst1, VDI, VMware, Linux Audit logging in conjunction with the advanced Risk-Based Alerting (RBA) security framework.
- Strong understanding of network protocols, operating systems, applications, and device event telemetry.
- Familiarity with network defense tools (firewall, IPS/IDS, WAF/CDN, etc.), endpoint defense tools (EDR, anti-malware) a plus.
- Experience with SAAS- or cloud-hosted Splunk implementation a plus.
- Solid communication and collaboration skills, both oral and written, with excellent interpersonal and organizational skills.
- Must be a US Citizen or have permanent residence status (Green Card).
- Must be able to obtain a Position of Public Trust Clearance.
- Must be able to pass a drug screening, criminal history, and credit checks.
- Must have lived in the United States for the past 5 years.
- Cannot have more than 6 months travel outside the United States within the last five years. Military Service excluded. (Exception does not include military family members).