Overview
On Site
USD 153,500.00 - 198,550.00 per year
Full Time
Skills
Software Administration
Accountability
Onboarding
Normalization
Provisioning
Technology Assessment
Customization
System Administration
Red Hat Linux
Servers
Testing
Operating Systems
Firmware
Ansible
Scripting
Python
Delegation
Relationship Building
Mentorship
Network
Fusion
Use Cases
Quality Assurance
Documentation
Management
Training
Event Management
Root Cause Analysis
Incident Management
Collaboration
Leadership
Business Administration
Computer Science
Science
Mathematics
Information Security
Network Engineering
Research
Security+
CISSP
CISA
Cyber Security
Data Analysis
Cloud Computing
SIEM
Splunk
Performance Management
Preventive Maintenance
Project Management
Job Details
Job Summary:
The Splunk Administrator is responsible for maintaining and administering servers and infrastructure supporting Kaiser Permanente's Security Information & Event Management platform as well as perform Splunk application administration activities including administration of a Splunk Cloud environment. The Splunk Administrator will augment an existing team and will perform system administration tasks on a very large and complex Red Hat environment and enterprise clustered Splunk environment.
The Splunk Administrator will be responsible and accountable for the following:
Performing Splunk data onboarding, event normalization, user provisioning, Splunk TA customization/development, and general troubleshooting of Splunk Enterprise, Splunk Universal Forwarders, and other Splunk components
Performing system administration on more than 300 Red Hat servers
Testing and deploying operating system, firmware, and application patches
Development of system automation using Ansible scripting and Python development
This senior level employee is primarily responsible for overseeing the maintenance and protection of integrity and reliability of the security of data, systems and networks.
Essential Responsibilities:
Additional Requirements:
Preferred Qualifications:
Primary Location: Colorado,Greenwood Village,Greenwood Plaza IT
Scheduled Weekly Hours: 40
Shift: Day
Workdays: Mon, Tue, Wed, Thu, Fri
Working Hours Start: 08:00 AM
Working Hours End: 05:00 PM
Job Schedule: Full-time
Job Type: Standard
Worker Location: Remote
Employee Status: Regular
Employee Group/Union Affiliation: NUE-IT-01|NUE|Non Union Employee
Job Level: Individual Contributor
Department: KPIT ADMIN - TRO RISANT - 9601
Pay Range: $153500 - $198550 / year
Travel: No Kaiser Permanente is an equal opportunity employer committed to fair, respectful, and inclusive workplaces. Applicants will be considered for employment without regard to race, religion, sex, age, national origin, disability, veteran status, or any other protected characteristic or status.
The Splunk Administrator is responsible for maintaining and administering servers and infrastructure supporting Kaiser Permanente's Security Information & Event Management platform as well as perform Splunk application administration activities including administration of a Splunk Cloud environment. The Splunk Administrator will augment an existing team and will perform system administration tasks on a very large and complex Red Hat environment and enterprise clustered Splunk environment.
The Splunk Administrator will be responsible and accountable for the following:
Performing Splunk data onboarding, event normalization, user provisioning, Splunk TA customization/development, and general troubleshooting of Splunk Enterprise, Splunk Universal Forwarders, and other Splunk components
Performing system administration on more than 300 Red Hat servers
Testing and deploying operating system, firmware, and application patches
Development of system automation using Ansible scripting and Python development
This senior level employee is primarily responsible for overseeing the maintenance and protection of integrity and reliability of the security of data, systems and networks.
Essential Responsibilities:
- Conducts or oversees business-specific projects by applying deep expertise in subject area; promoting adherence to all procedures and policies; developing work plans to meet business priorities and deadlines; determining and carrying out processes and methodologies; coordinating and delegating resources to accomplish organizational goals; partnering internally and externally to make effective business decisions; solving complex problems; escalating issues or risks, as appropriate; monitoring progress and results; recognizing and capitalizing on improvement opportunities; evaluating recommendations made; and influencing the completion of project tasks by others.
- Practices self-leadership and promotes learning in others by building relationships with cross-functional stakeholders; communicating information and providing advice to drive projects forward; influencing team members within assigned unit; listening and responding to, seeking, and addressing performance feedback; adapting to competing demands and new responsibilities; providing feedback to others, including upward feedback to leadership and mentoring junior team members; creating and executing plans to capitalize on strengths and improve opportunity areas; and adapting to and learning from change, difficulties, and feedback.
- Leads team in the proactive monitoring and/or response to known or emerging threats against the KP network.
- Effectively communicates investigative findings to non-technical audiences.
- Plans and facilitates regular operations meeting with Cyber Risk Defense Center (CRDC) teams.
- Supports closed loop processes on security efforts by providing feedback to the TDA leads and/or leadership.
- Participates in information fusion procedures across operations and engineering, including activities such as Use Case planning/development, Use Case quality assurance validation, and response procedure documentation.
- Serves as a liaison between stage teams and upper management by identifying issues, improvement areas, or security/architectural gaps and suggesting appropriate improvements.
- Drives the development of the CRDC intellectual capital by leading process or procedure improvements, consulting on brown bag training sessions, and leading the development of new training documents.
- Partners with the CRDC Policy Engineers and Remediation teams to contain identified issues and determine the best approach for improving security posture.
- Facilitates follow-up remediation design and review efforts.
- Leads the investigation and triage of security events across multiple domains.
- Leads complex data analyses in support of security event management processes, including root cause analysis.
- Coordinates the response and resolution of high impact or critical cyber security incidents.
- Leads the deployment of threat detection capabilities and/or incident response plans which may include after-hours support and coordination among responsible teams.
- Drives the execution of incident detection and/or handling processes which may include containment, protection, and remediation activities.
- Minimum two (2) years in an informal leadership role working with project or technical teams.
- Bachelors degree in Business Administration, Computer Science, Social Science, Mathematics, or related field and Minimum eight (8) years experience in IT or a related field, including Minimum two (2) years in information security or network engineering. Additional equivalent work experience may be substituted for the degree requirement.
Additional Requirements:
Preferred Qualifications:
- Three (3) years experience in large scale cyber security data analytics, including the identification of data-driven threat collection opportunities.
- Three (3) years experience in cyber security threat research or large scale data analytics.
- Three (3) years in the operation of SIEM solutions.
- Security certification (Security+, CISSP, CISA).
- Experience in cyber security data analytics leveraging the Splunk platform.
- Experience in the operation of Splunk Cloud and Splunk Enterprise Security SIEM solutions
- Splunk Certified Administrator
Primary Location: Colorado,Greenwood Village,Greenwood Plaza IT
Scheduled Weekly Hours: 40
Shift: Day
Workdays: Mon, Tue, Wed, Thu, Fri
Working Hours Start: 08:00 AM
Working Hours End: 05:00 PM
Job Schedule: Full-time
Job Type: Standard
Worker Location: Remote
Employee Status: Regular
Employee Group/Union Affiliation: NUE-IT-01|NUE|Non Union Employee
Job Level: Individual Contributor
Department: KPIT ADMIN - TRO RISANT - 9601
Pay Range: $153500 - $198550 / year
Travel: No Kaiser Permanente is an equal opportunity employer committed to fair, respectful, and inclusive workplaces. Applicants will be considered for employment without regard to race, religion, sex, age, national origin, disability, veteran status, or any other protected characteristic or status.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.