Overview
Skills
Job Details
DivIHN (pronounced divine ) is a CMMI ML3-certified Technology and Talent solutions firm. Driven by a unique Purpose, Culture, and Value Delivery Model, we enable meaningful connections between talented professionals and forward-thinking organizations. Since our formation in 2002, organizations across commercial and public sectors have been trusting us to help build their teams with exceptional temporary and permanent talent.
Visit us at to learn more and view our open positions.
Amit at
Location: Remote
Duration: 12 Months
Schedule: 40 Hours Per Week
- Cyber Security Program Office (CSPO) promotes the safe and secure use of technology.
- The CSPO serves Client by providing a variety of cybersecurity services including consultation, protection technologies, detection technologies, cybersecurity education and awareness, cybersecurity incident management, vulnerability management, compliance, and cybersecurity risk management.
Scope:
- This engagement requires a contract for a position for 1 year at 40 hours per week.
- The Splunk Detection Engineer will play an important role in ensuring that security logs are appropriately formatted, ingested, tagged, and used to detect possible security events.
- Typical tasks may include:
Validating and creating appropriate configurations for CIM compliant logs
Processing requests from cybersecurity analysts for new detections within Splunk Enterprise Security
Analyzing existing logs to identify poorly formatted logs and potential gaps when implementing new detections
Adding and maintaining threat feeds within Splunk Enterprise Security
Monitoring the performance of and tuning detections
Managing asset and identity inventory within Splunk Enterprise Security
Creating and maintaining new Splunk apps
Recommending additions or changes to Splunk or its data models to meet detection needs
Developing searches, reports, and other functionalities for cyber-based use-cases, including active response, intrusion detection, vulnerability management, and related use cases
Assisting users with creating and optimizing searches and dashboards and mentoring others in good development of said resources.
Attend online/Teams meetings with team and others as appropriate
Work with team to provide status on current task, suggest improvements, discuss implementation, etc.
The ideal candidate will support the projects and tasks associated with cybersecurity log collection, analysis, and event detection.
Report to the Deputy Chief Information Security Officer within the Business & Information Services division; including daily guidance and collaboration with others in the Cyber Security Program Office (CSPO).
- The project managers measure work performed by the contractor on a task basis. The tasks typically represent 8 to 80 hours of effort with performance being measured at the completion of each of the assigned tasks. Hours will be recorded on a weekly time sheet; progress against planned tasks will be reported weekly or bi-weekly, at the discretion of the Deputy CISO.
- Typically, the work is performed remotely. For the candidate within driving distance of the Lab, there may be rare times to be onsite for in-person meetings, assessments, or presentations. Most of the Business Information Services (BIS) Division works remotely and are rarely onsite. If the candidate is out of state, too far away from the Lab, onsite meetings are not feasible to attend and not required.
Capture business requirements and implement the requirements
Analyze data and perform initial planning to address identified issues
Assist with the creation of playbooks to address identified issues from analysts
Seek to understand the intention of detections and corresponding playbooks
Provide basic feedback on existing playbooks and detections
Identify telemetry quality and visibility issues (SIEM parsing/normalization, EDR/XDR sensor health, asset/identity tagging).
Provide advanced recommendations to address gaps in logging and detections based on an analysis of threats and data
Create detailed and thorough testing plans to ensure higher chance of accurate detections
Produce clear metrics and reports (FP rate, backlog) for technical and executive audiences
Create advanced use cases for detections based on an analysis of threats and data, including sample criteria to identify the behavior and mapping detections to MITRE ATT&CK
Drive continuous improvements to existing processes or tooling
Perform quality reviews and improve detections and actions
Coach, guide, teach others on the team in use of Enterprise Security
Significant experience with Splunk and Splunk Enterprise Security
Significant experience with event logging solutions (e.g., Splunk Universal Forwarder, syslog, Cribl)
Experience with ticketing/case management.
Experience with Git pipelines
Familiarity with using Linux CLI
Ability to craft queries using common languages; comfort with regex, JSON and APIs; basic scripting in Python/PowerShell/Bash.
Excellent analytical, problem-solving, and communication skills both with stakeholders, peers, and internal customers; able to operate under pressure in a shift or on-call environment.
Strong grasp of TCP/IP, OSI model, and common protocols (HTTP, DNS, SMTP). Windows/Linux/macOS fundamentals; Active Directory/Azure AD concepts; basic cloud logging.
Experience in system and network administration.
Relevant cybersecurity experience including investigations and data analysis.
Experience with SOAR tools and automation development.
Experience using identity security/management tools (e.g., Entra ID, Active Directory, Shibboleth, CrowdStrike Identity Protection).
Cloud security experience (e.g., CloudTrail/GuardDuty, Azure Defender/M365, Google Cloud Platform Security Command Center).
Considerable knowledge using and administering Splunk.
Staying up to date with the latest cybersecurity threats, vulnerabilities, and best practices.
Strong analytical and problem-solving skills.
Meticulous attention to detail to ensure thorough assessments and accurate reporting.
Excellent written and verbal communication skills to effectively convey findings and recommendations to technical and non-technical stakeholders.
Ability to work collaboratively with other cybersecurity professionals, IT staff, and external vendors.
Experience and skill in conducting audits or reviews of technical systems.
Experience working in a government environment.
Experience working in a distributed IT environment.
Ability to qualify for HSPD-12 card for use in two-factor authentication.
Able to work both independently and as a contributing member of a small technical team
Able to disseminate knowledge to current staff.
Client will supply a government-furnished laptop, PIV Card, and PIV Card reader.
The contractor shall adhere to all policies and procedures of the ANL Computer Protection Program, must not bypass any procedures established to protect data, applications, hardware, or communications at ANL, must maintain a work environment that will satisfy audit, privacy, and protection requirements, and must report any findings of inadequacies to the technical contact and the BIS Computer Protection Program Representative.
The Cyber Security Program Office follows the National Institute of Standards and Technology (NIST) Cyber Security Framework. All subcontracts, where applicable, will work within the same requirements as though the subcontractor was part of the Clients cyber program.
Client's Cyber Security Program requires that all persons who access sensitive data or applications must learn and adhere to protection requirements of the data or application, must not bypass procedures established to protect data and applications, and must immediately report any findings of inadequacies in protection procedures to the Cyber Security Program Office.
In cases where staffing is required, vetting of identity (NIST 800-63 Identity Assurance Level 3) and strong authentication (NIST 800-63 Authentication Assurance Level 3) will be required. Client uses the HSPD-12 smart card for staff relationships that last longer than 6 months.
Client may provide relevant information requested from the vendor or remote access as required to gather information. U.S. citizenship will be required for any access to systems or data.
The manager of the contract and the Cyber Security Program Office must approve authorization for remote work.
Working remotely outside of scheduled times requires supervisor approval prior to performing that remote work.
While working remotely, just like when onsite, all scheduled meetings must be attended (using approved remote communication tools).
The candidate must be available for consultation during all scheduled work time, reachable by email, phone, chat, or other approved means.
Performance will be monitored to determine productivity for remote work at least matches that when onsite. If performance and deliverables decline, remote work may be suspended.
Should a situation arise that requires the candidate to be onsite while scheduled to work remotely, accommodation will be made to reschedule the remote work, if desired.
The remote work privilege may be revoked at any time at the discretion of Client.
A flexible work schedule may also be possible if the schedule is agreed to by the candidate and approved by the supervisor and sponsor.
Should the Client close operations due to weather or other circumstances, remote work is preferred.
Lastly, the candidate must track their remote work schedule into the CSPO absence calendar and be approved by CSPO supervisor.
Work will be performed remotely (within the confines of the United States of America), and team communication will be done through Microsoft tools such as Microsoft Teams and Microsoft Outlook.
DivIHN is an equal opportunity employer. DivIHN does not and shall not discriminate against any employee or qualified applicant on the basis of race, color, religion (creed), gender, gender expression, age, national origin (ancestry), disability, marital status, sexual orientation, or military status.