Sr. Splunk Administrator (SIEM Engineer)

2143 Annapolis Junction MD

Apply now Apply later

Come join our exciting and fast-growing National Security Group!

You'll love it here! Why? Because, in addition to great teams, we offer competitive salaries, bonus programs, competitive paid leave, holidays, beyond ordinary benefits, and many opportunities for continual professional growth and development, including a robust technical upskilling program, paid/sponsored certifications, leadership development training opportunities and generous tuition reimbursement programs.

We are looking for a Sr. Splunk Administrator-SIEM (Security Information and Event Management) Engineer / Splunk Certified Admin to join a high performing agile team using the Scaled Agile Framework (SAFe) methodology to support a large, complex, and fast-paced program. Program execution follows DEVOPS best practices and employs robust development, test, and production environments. We are using Behavior Driven Development (BDD) and test automation tools alongside a full suite of team collaboration tools. The program provides system engineering, development, test, integration, and operational support for a program that is focused on injecting new technology and adding advanced capabilities while continuing to support an on-going mission and operational system.

Job Summary / Primary Responsibilities:

You will be responsible for configuring the collection, parsing, correlation, and visualization of events for a critical operational system. You will demonstrate strong skills in system administration, log management, event correlation, and threat detection and will support building and maintaining a system that analyzes collected data and derives facts, inferences, and projections to determine if the systems being monitored are operating normally; work on a team responsible for configuring the systems which support analysts and end-users; support the collection and extraction of data used to refine existing and new reports, analytics, and dashboards, and will be involved with the drafting and creation of reports and dashboards based on end-user requirements. You will also support the integration of resources across teams to better define the audit data being collected to eliminate false positives and false negatives from the data.

*Qualified candidates are eligible for enhanced incentives including up to a $25K cash sign on bonus or a paid time off bonus.

Security Clearance Requirement:

  • Candidates must possess an active TS/SCI with polygraph up front to be considered for this role.

Basic/Required Qualifications:

  • Bachelor’s degree in computer science, Engineering, Information Assurance, or a related discipline and at least eight (8) years of related experience. Additional experience may be substituted for a Degree.

  • Must have Splunk Enterprise Certified Admin Certificate or higher.

  • At least 2 years of experience with one or more of the following: ArcSight, Splunk, Grafana, StealthWatch, TripWire, Zenoss.

  • Experience in design, implementation, and support of Splunk core components, including indexers, forwarders, search heads, and cluster managers.

  • Experience with configuration and administration of Splunk ingestion and forwarding for new and existing applications and data.

  • Experience with troubleshooting Splunk dataflow issues between the various Splunk core components.

  • Experience configuring and deploying data collection for a variety of operating systems and networking platforms.

  • Experience creating Dashboards and Analytics within SIEM tools.

  • Experience working with monitoring systems supporting auditing, incident response, and system health.

  • Understanding of networking components and devices, ports, protocols, and basic networking troubleshooting steps.

  • The ability to troubleshoot issues with log feeds, search time, and field extractions.

  • The ability to troubleshoot problems related to data solutions.

Preferred Qualifications:

  • Network Security Operations Center (SOC) experience.

  • Experience and talent in data visualization.

  • Experience creating workflows for Incident Response within a SIEM Tool.

  • Experience working on an Agile team/program.

careers.leidos.com/CONMD

CSSKEY

CONMD

Original Posting Date:

2024-09-18

While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.

Pay Range:

Pay Range $101,400.00 - $183,300.00

The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

Apply now Apply later
  • Share this job via
  • 𝕏
  • or
Job stats:  0  0  0

Tags: Agile Analytics ArcSight Audits Automation Clearance Computer Science DevOps Grafana Incident response Monitoring Network security Polygraph Security Clearance SIEM SOC Splunk Threat detection Tripwire TS/SCI

Perks/benefits: Career development Competitive pay Equity / stock options Flex vacation Health care Salary bonus Signing bonus Team events

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.