Splunk System Administrator

  • NORTH CHARLESTON, SC
  • Posted 14 days ago | Updated 9 hours ago

Overview

On Site
Full Time

Skills

GRID
Research
Development Testing
Enterprise Networks
Cyber Security
Network Security
Computer Networking
Product QA
Evaluation
Network Design
Information Assurance
Impact Analysis
Information Architecture
Network
Server Architecture
Python
Linux
SQL
Ruby
Windows PowerShell
Event Management
SIEM
Continuous Integration and Development
Jenkins
Continuous Integration
Git
Technical Writing
System Administration
DoD
GSEC
Security+
SSCP
CISSP
Splunk
Security Clearance
SAP BASIS
Information Technology
Systems Engineering
FOCUS

Job Details

Job ID: 2504642

Location: NORTH CHARLESTON, SC, US

Date Posted: 2025-04-18

Category: Information Technology

Subcategory: Sys Administrator

Schedule: Full-time

Shift: Day Job

Travel: Yes, 10 % of the Time

Minimum Clearance Required: Secret

Clearance Level Must Be Able to Obtain: Top Secret

Potential for Remote Work: No

Description

SAIC is looking for a Splunk System Administrator to provide support for our Navy Computer Defense Network (CND) subcontract located at Joint Base Charleston (JBC), No. Charleston, SC. Navy CND is an integral part of the cyber defense posture, protecting the Navy's component of the Global Information Grid (GIG) from exploitation and strongly linking to critical infrastructure protection. Naval Information Warfare Center (NIWC) Atlantic requires resources to support the Research, Development, Test & Evaluation (RDT&E) and Integration activities for the Information Technology for the 21st Century (IT-21), and OCONUS Navy Enterprise Network (ONENET) networks, to enhance network and cyber security.

As a member of the CND Engineering Team the candidate will provide network security design, installation, support, and system administration support for Computer Network Defense Systems (CNDS). Candidate will perform product testing, product evaluation and reviews, network design, and system development of Information Assurance (IA) and network systems. This team consists of numerous engineers and SMEs tasked with finding the next solutions for CND systems.

Qualifications

Education and experience:
  • Must have a Bachelor's degree and five (5) years of related experience; Master's degree and three (3) years of related experience; years of experience may be substituted in lieu of a degree.

Required skills:
  • At least 5 years of experience with Splunk, preferably with back-end Splunk development/server architecture/design experience.
  • Experience or familiarity with Python, Linux, SQL, Ruby, and PowerShell.
  • Security Information and Event Management (SIEM) experience (Splunk, Distributed Splunk).
  • Continuous Development/Integration software (Jenkins, GIT CI) experience.
  • GIT experience.
  • Be self-motivated with the ability to work both independently and in a collaborative environment.
  • Be comfortable with the creation of in-depth, accurate technical documentation.
  • Have system administration experience on DoD-deployed systems.

Required certifications:
  • Have one of the following security certifications: GSEC, Security +, SCNP, SSCP, or CISSP.
  • Splunk Certified Enterprise Admin or Splunk Certified Enterprise Architect certification must be obtained within 6 months of start date.

Required clearance:
  • This position requires a minimum of a Secret security clearance to start and will require a Top Secret to be obtained post hire.


SAIC accepts applications on an ongoing basis and there is no deadline.

Covid Policy: SAIC does not require COVID-19 vaccinations or boosters. Customer site vaccination requirements must be followed when work is performed at a customer site.


Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.

About SAIC