Certified Splunk Engineer

Overview

Remote
Depends on Experience
Contract - W2

Skills

Splunk
EDR
SIEM
CEF
OCSF

Job Details

Job Description:

  • Minimum of 6+ years of experience in a technical role in the areas of Security Operations, Incident Response, Content Development or Equivalent Experience in a large Enterprise Splunk Environment performing triage and administrative duties.
  • Direct experience performing content detection engineering and threat hunting in an active corporate environment.
  • Significant experience working with Splunk Procedure Language to create and tune detections.
  • Experience mapping data fields to a common data model such as CEF, OCSF.
  • Direct experience working with very large datasets and log analysis tools including but not limited to: Splunk, Python, Pandas, SQL, Hadoop, Hue
  • Ability to see the larger picture when dealing with competing requirements and needs from across the organization in order to build consensus and drive results.
  • Ability to navigate and work effectively across a complex, geographically dispersed organization.
  • Experience with enterprise scale EDR, SIEM, and SOAR tools.
  • Experience in requirements gathering around the Splunk tool, documenting requirements, requirement analysis, product testing, etc.
  • Splunk Infrastructure Management Experience/Knowledge
  • Collaborate with teams to Monitor and optimize the performance of the Splunk environment, to ensure efficient data processing and search capabilities on our search heads.
  • Ability to troubleshoot, triage and resolve issues related to Splunk Infrastructure, ensuring high availability and reliability.
  • Experience in Splunk enterprise and Splunk Cloud
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.