Information security Sr. Splunk analyst

Rockville, MD, US • Posted 9 hours ago • Updated 9 hours ago
Full Time
No Travel Required
On-site
$75 - $80/hr
Company Branding Image
Fitment

Dice Job Match Score™

⭐ Evaluating experience...

Job Details

Skills

  • Incident Response & Risk Management
  • Computer Security Incident Response (CSIR)
  • Data Loss Prevention (DLP
  • ServiceNow events
  • NIST SP 800-53
  • NIST 800-61
  • and CISA CDM
  • security frameworks like Mitre Attack
  • Cyber Kill Chain
  • etc
  • SOC/TOC/NOC
  • • Mac OS
  • Windows

Summary

My Client is seeking an information security Sr. Splunk analyst who will be a key member of a consulting team providing advice, support and reporting to federal agencies, in the Incident Response & Risk Management areas of Information Security.

This role will be primarily responsible for but not limited to conducting incident handling tasks during different phases of Computer Security Incident Response (CSIR), engineering, implementing, and optimizing Splunk capabilities that support enterprise-wide cybersecurity monitoring, detection, automation and incident response.

The incumbent must be able to design custom dashboards based on defined requirements, support incident response and root cause analysis, and develop automation and integrations with Data Loss Prevention (DLP), ServiceNow events and other enterprise systems. This role directly contributes to the agency’s cybersecurity mission, ensuring visibility, resilience, and rapid response to threats.

 

Key Responsibilities

  • Monitor and analyze security events and alerts from multiple sources, including security information and event management Security Information & Event Management (SIEM) software, network and host-based intrusion detection systems, firewall logs, and system logs (Windows, Linux, and Unix), and databases
  • Design, develop, and maintain custom Splunk dashboards aligned with SOC and stakeholder requirements

·      Design and implement automation workflows, integrating Splunk with ServiceNow for incident management and response

  • Support and employ approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness).

·      Develop and optimize SPL queries, correlation searches, and detection use cases within Splunk Enterprise Security (ES)

·      Support incident response activities, including log analysis, event correlation, and forensic investigation

  • Separate true threats from false positives using network and log analysis and escalate possible intrusions and attacks

·      Conduct root cause analysis (RCA) and produce technical reports and after-action documentation

·      Develop integrations using APIs, scripting (Python/PowerShell), and webhooks across security and IT systems

·      Ensure compliance with federal cybersecurity frameworks such as NIST SP 800-53, NIST 800-61, and CISA CDM

·      Optimize Splunk performance, data ingestion, and system scalability

·      Provide technical leadership and mentorship to SOC analysts and junior engineers

  • Work within a team of diverse individuals and cross-functional teams to solve unique and complex problems with broad impact for client services and business.
  • Provide clear, daily updates to management on security incidents; Investigate, document, and report on forensic investigations
  • Provide daily updates to management concerning assigned or progressive security projects.

 

Basic Qualifications

  • Excellent teamwork and interpersonal skills
  • Experience with intrusion detection/prevention systems and SIEM software
  • Ability to analyze event logs and recognize signs of cyber intrusions/attacks
  • Ability to handle high pressure situations in a productive and professional manner
  • Strong written and verbal communication skills and the ability to present complex technical topics in clear and easy-to-understand language
  • Experience with security frameworks (i.e., Mitre Attack, Cyber Kill Chain, etc.)
  • Experience in network/host vulnerability analysis, intrusion analysis, digital forensics, or related areas
  • Familiarity with but not limited to: Vulnerability Management (VM), Assessment and Authorization (A&A) process, Risk Management Framework (RMF)
  • 2+ years of hands-on SOC/TOC/NOC experience
  • GCIA, GCIH, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred
  • Understanding of programming/scripting languages and ability to run database queries
  • Minimum bachelor’s degree in information security, Computer Science, or 8 years’ related experience
  • Ability to work at the client’s site in Rockville, MD with limited telework/remote work options

 

Strong knowledge of the following

  • Security Information & Event Management (SIEM)
  • Secure Sockets Layer (SSL) Decryption / Transport Layer Security (TLS) Decryption
  • Experience with Foreign Travel Threats and Vectors.
  • Malware Detection, Endpoint Detection and Response (EDR)
  • Packet Analysis with Network Monitoring Tools & a deep understanding of network protocols and devices.
  • Mac OS, Windows, and Unix/Linux systems
  • Email Security
  • Data Loss Prevention (DLP)
  • Anti-Virus: Microsoft Defender for Endpoint (MDE), Microsoft Defender Antivirus (MDAV)

 

 

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: 10106963
  • Position Id: 8958735
  • Posted 9 hours ago

Company Info

About International Software Systems, Inc

International Software Systems, Inc. (ISSI) stands as a prominent IT services provider in Greenbelt, Maryland. Our mission is to deliver exceptional solutions to a diverse range of clients, including Federal, State, Local, and Commercial organizations. With a remarkable history spanning 28 years, ISSI has made significant strides in the industry, establishing offices in California, Florida, and Dallas and offshore facilities in Hyderabad, India, to expand our global reach.

Client satisfaction is our paramount priority at ISSI. We take immense pride in being recognized as an Innovative, Strategic, Sustainable, and Insightful partner by our clients, rather than simply a vendor. Our guiding principle is elegantly simple "Customer First, Cheers Later!" 

As a minority-owned small business, we exemplify a commitment to diversity and inclusivity. Our dedication to quality and excellence is evident through our ISO 9001:2015 and 27001:2013 certifications, as well as our CMMI Level 3 certification, attesting to our adherence to industry-leading standards and best practices.

We efficiently cater to various governmental and commercial projects through GSA MAS Schedule, CMS-SPARC, Seaport-e, MD State CATS+, Prince George's CATS, WSSC CATS, CIO-SP3, ITSSC II, and other channels. Additionally, our Minority Business Enterprise (MBE) certifications in Maryland and Virginia solidify our standing as a trusted and reliable partner in the industry.

At ISSI, we thrive on building strong relationships with our clients, always aiming to surpass their expectations by providing innovative solutions that drive their success. We believe in staying ahead of the technological curve, enabling us to adapt and flourish in an ever-evolving IT landscape.

About_Company_One
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

Washington, District of Columbia

3d ago

Easy Apply

Full-time

75 - 80

Rockville, Maryland

3d ago

Easy Apply

Full-time

73 - 75

Search all similar jobs