
Senior Splunk Engineer
- Denver, CO
- $98,400-158,200 per year
- Permanent
- Full-time
- Minimum of 6+ years of experience in a technical role in the areas of Security Operations, Incident Response, Content Development or Equivalent Experience in a large Enterprise Splunk Environment performing triage and administrative duties.
- Direct experience performing content detection engineering and threat hunting in an active corporate environment.
- Significant experience working with Splunk Procedure Language to create and tune detections.
- Experience mapping data fields to a common data model such as CEF, OCSF.
- Direct experience working with very large datasets and log analysis tools including but not limited to: Splunk, Python, Pandas, SQL, Hadoop, Hue
- Ability to see the larger picture when dealing with competing requirements and needs from across the organization in order to build consensus and drive results.
- Ability to navigate and work effectively across a complex, geographically dispersed organization.
- Experience with enterprise scale EDR, SIEM, and SOAR tools.
- Experience in requirements gathering around the Splunk tool, documenting requirements, requirement analysis, product testing, etc.
- Splunk Infrastructure Management Experience/Knowledge
- Collaborate with teams to Monitor and optimize the performance of the Splunk environment, to ensure efficient data processing and search capabilities on our search heads.
- Ability to troubleshoot, triage and resolve issues related to Splunk Infrastructure, ensuring high availability and reliability.
- Experience in Splunk enterprise and Splunk Cloud
- Design and implement data ingestion strategies for various log sources into Splunk.
- Develop and maintain parsing configurations to normalize and enrich incoming data for effective analysis.
- Collaborate with application owners and IT teams to onboard new data sources into Splunk.
- Search and Reporting:
- Create and optimize search queries and reports to extract valuable insights from the indexed data.
- Customize and implement Splunk dashboards for different stakeholders to visualize key performance indicators and security metrics.
- Implement security best practices within Splunk to safeguard sensitive data.
- Collaborate with the security team to configure and monitor alerts for suspicious activities or security incidents.
- Ensure compliance with industry regulations and internal policies related to log management and data retention.
- Automation and Scripting:
- Develop automation scripts using SPL (Search Processing Language) and other scripting languages to streamline administrative tasks.
- Continuously seek opportunities to improve efficiency through automation in Splunk processes.
- Maintain thorough documentation of Splunk configurations, processes, and troubleshooting procedures.
- Provide training and support to other IT team members on Splunk best practices and usage.
- Experience consuming, analyzing, and reporting Cyber Threat Intelligence for actionable takeaways
- Demonstrated ability to self-direct, with minimal supervision to achieve assigned goals.
- Experience with offensive security tools and integration of SIEM, SOAR, CSPM and other technical integrations within large enterprise networks.
- Knowledge of basic Data Science concepts and processes.
- Experience performing security analysis and threat hunting in Cloud environments such as Azure, M365, AWS
- Experience Maintaining KV Stores.
- Experience Performing Regular Updates/Upgrades on Splunk Apps and Add-ons. As well as the Splunk environment as a whole.
- Influence
- Result Orientation
- Solution Design
- Stakeholder Management
- Technical Strategy Development
- Access and Identity Management
- Critical Thinking
- Cyber Security
- Information Systems Management
- Risk Management
- Collaboration
- DevOps Practices
- Financial Management
- Solution Delivery Process
- Test Engineering