IT Security SIEM Engineer

  • New York, NY
  • Posted 9 hours ago | Updated 9 hours ago

Overview

On Site
$Competitive
Accepts corp to corp applications
Contract - W2
Contract - Independent
Contract - 7/31/2026

Skills

Servers
IT Security
SIEM
Linux
Dashboard
Management
Database
Presentations
Data Analysis
Data Visualization
Reporting
Onboarding
Incident Management
Packet Analysis
IDS
IPS
Network
Communication
Cloud Computing
Splunk
GCIH
SEI
CISSP
SSCP
Cisco Certifications
Certified Ethical Hacker
Microsoft Certified Professional

Job Details

Scope of Work:
The IT Security SIEM (Splunk) Engineer will provide overall engineering, and administration in supporting a cloud based Splunk environment consisting of search heads, indexes, deployers, deployment servers, heavy/universal forwarders and Splunk apps spanning security, performance, and operational roles.
The Engineer should be proficient with recognizing and onboarding new data sources into Splunk, analyzing the data for anomalies and trends, and building dashboards highlining the key trends of the data.
The IT Security SIEM (Splunk) Engineer should be proficient within Linux environment, edition and the following:
Good understanding and hands-on experience of designing business solutions using Splunk
Design, develop, and maintain complex Splunk queries and dashboards intended for technical and executive audiences
High level experience with dashboards, reports, alerts and managing knowledge objects
Knowledge of enterprise logging, including application, web, database, and security logging
Strong interpersonal, communication, and presentation skills
Advanced experience with Splunk data analytics, data visualization, reporting capabilities
Ability to work self-sufficiently on assigned tasks
Job Description:
Good understanding and hands on experience of designing business solutions using Splunk.
Ability to Design, develop, and maintain complex Splunk queries and dashboards intended for technical and executive audiences.
High level experience with dashboards, reports, alerts and managing knowledge objects.
Knowledge of enterprise logging, including application, web, database, and security logging.
Strong interpersonal, communication, and presentation skills.
Advanced experience with Splunk data analytics, data visualization, reporting capabilities.
Ability to work self-sufficiently on assigned tasks.
Responsible for identifying and onboarding of log sources to help with monitoring, detection, and response.
Work with stakeholders to develop requirements and deliverables.
Responsible for identifying and onboarding of log sources to help with monitoring, detection, and response
Work with stakeholders to develop requirements and deliverables

Qualifications and Desired Skills:
Knowledge of Incident Response Procedures
Knowledge of Packet Analysis
Knowledge of IDS/IPS solutions and various Host-Based Tools
Experience with Log Aggregation Tools
Knowledge of patterns in network and system activity via log correlation using Splunk and supplemental tools
Verbal and written communication ability
Splunk Certified to include but not limited to Splunk Enterprise Certified Admin,
Splunk Cloud Certified Admin, Splunk Enterprise Certified Architect
CASP, GCIH, GCWN, GISF, GISP, GSSP, GICSP, GSSP, SEI, CISSP, CSSLP, SSCP, CCNP, CCNP Security, CCIE Security, CEH, ECSP, MCSE
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.