IT Security SIEM Engineer( Splunk)- Looking Locals to NYC/NJ

• Posted 60+ days ago • Updated 5 hours ago
Full Time
Fitment

Dice Job Match Score™

⏳ Almost there, hang tight...

Job Details

Skills

  • Servers
  • IT Security
  • SIEM
  • Linux
  • Dashboard
  • Management
  • Database
  • Presentations
  • Data Analysis
  • Data Visualization
  • Reporting
  • Onboarding
  • Incident Management
  • Packet Analysis
  • IDS
  • IPS
  • Network
  • Communication
  • Cloud Computing
  • Splunk
  • GCIH
  • SEI
  • CISSP
  • SSCP
  • Cisco Certifications
  • Certified Ethical Hacker
  • Microsoft Certified Professional

Summary

Role : IT Security SIEM Engineer ( Splunk)- Looking Locals to NYC/NJ

Location: NYC, NY

Duration: 12 Months

Scope of Work:

The IT Security SIEM (Splunk) Engineer will provide overall engineering, and administration in supporting a cloud based Splunk environment consisting of search heads, indexes, deployers, deployment servers, heavy/universal forwarders and Splunk apps spanning security, performance, and operational roles. The Engineer should be proficient with recognizing and onboarding new data sources into Splunk, analyzing the data for anomalies and trends, and building dashboards highlining the key trends of the data.

The IT Security SIEM (Splunk) Engineer should be proficient within Linux environment, edition and the following:
Good understanding and hands on experience of designing business solutions using Splunk
Ability to Design, develop, and maintain complex Splunk queries and dashboards intended for technical and executive audiences
High level experience with dashboards, reports, alerts and managing knowledge objects
Knowledge of enterprise logging, including application, web, database, and security logging
Strong interpersonal, communication, and presentation skills
Advanced experience with Splunk data analytics, data visualization, reporting capabilities
Ability to work self-sufficiently on assigned tasks
Responsible for identifying and onboarding of log sources to help with monitoring, detection, and response
Work with stakeholders to develop requirements and deliverables

Desired Skills:

o Knowledge of Incident Response Procedures

o Knowledge of Packet Analysis

o Knowledge of IDS/IPS solutions and various Host-Based Tools

o Experience with Log Aggregation Tools

o Knowledge of patterns in network and system activity via log correlation using Splunk and supplemental tools

o Verbal and written communication ability

o Splunk Certified to include but not limited to Splunk Enterprise Certified Admin,

o Splunk Cloud Certified Admin, Splunk Enterprise Certified Architect

o CASP, GCIH, GCWN, GISF, GISP, GSSP, GICSP, GSSP, SEI, CISSP, CSSLP, SSCP, CCNP,

o CCNP Security, CCIE Security, CEH, ECSP, MCSE
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: RTL939169
  • Position Id: 8a572de3bf2ea3ce0a65f8b3a0d0790d
  • Posted 30+ days ago
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

Remote or Somerville, Massachusetts

Today

Full-time

USD 75,275.20 - 109,553.60 per year

Annapolis, Maryland

Today

Full-time

USD 102,000.00 - 138,000.00 per year

Remote or Milwaukee, Wisconsin

Today

Full-time

Alexandria, Virginia

Today

Full-time

USD 107,900.00 - 195,050.00 per year

Search all similar jobs