Splunk Engineer (Remote, Direct Hire, Anywhere in US)

Splunk, Developer, Engineer, SIEM, Incident, response, threat, detection, mssp, security, cyber
Full Time
$125,000 - $135,000
Work from home available Travel not required

Job Description

US Citizen or Green Card Only.

Who We Are

we are redefining cybersecurity and are one of the fastest growing companies in the U.S. (Top 50 based on last year s Inc5000). we serves an impressive list of Fortune 50 and Global 2000 companies as well as numerous mid-sized enterprises. We ve established strategic partnerships with leading security vendors and serve as a trusted advisor to our customers. Our Core Values drive all aspects of the business and have been paramount to the company s success and foster our dynamic, entrepreneurial workplace. Your colleagues are some of the most technically astute minds in cybersecurity, who are passionate, knowledgeable, and willing to provide mentorship and guidance at every opportunity.

Our next generation Managed Security Services (MSSP) solution is redefining the industry. If you have the passion, work ethic, winning attitude and competitive mindset to be at the forefront of the best entrepreneurial MSSP in the U.S., we want you on our team.

We Offer

  • Knowledgeable and skilled colleagues seeking collaboration

  • We pay 100% of our employees health, dental, life & disability insurance premiums and a generous portion for dependents

  • We provide access to competitive 401k retirement plans upon eligibility

  • Paid Time Off

  • 10 Company Holidays

  • Most positions allow for some amount of telework and flextime, enabling our employees to manage work & life

  • All employees enjoy a generous mobile phone and home internet allowance

  • Apple products

  • Robust referral bonus program

  • Career paths

  • Training & Development opportunities

Splunk (SIEM) Engineer

Threat Hunters are focused on providing predictive analysis. The questions and issues they face will be to accurately forecast coming threats, to be on the cutting edge of research and their chosen specialization. They are responsible for getting actionable intelligence to the Detect team at large for developing tools and techniques for more efficient and effective monitoring, analysis, and response. Hunters are proactive and actively pursue threats in client environments as well as identifying them in the wild.


  • Leverage the SIEM for tracking anomalous activity and seeking malicious actors

  • Incident Response support and threat hunting in client environments

  • Validate suspicious events and incidents by using open-source and proprietary intelligence sources

  • Document new tools and techniques and disseminate them to the rest of the team

  • Document and manage incident cases in our case management system

  • Report incidents to the customer using a ticketing system

  • Interface with customers to resolve issues, provide additional information, and answer questions related to incidents and monitoring

  • Triage support requests and helpdesk queue to maintain SLA

  • Work an 8-hour shift as needed and directed to provide coverage for customer environments

  • Keep up-to-date with information security news, techniques, and trends

  • Identify and report any gaps in log collection or reporting as soon as possible to the customer and vSOC Engineering

  • Report any changes in customer environments to the Lead Analyst

  • Produce content regarding new threats, techniques and information for internal and external consumption

  • Perform Reputation and Brand analysis, credential dump monitoring and client environment tuning

  • Assist in Natural Disaster Planning and Alerting

  • Risk and Threat Assessment and Planning (Threat Modeling)

To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

Required Experience

  • Expertise in Information Security (Required)

  • Strong communication skills written and oral (Required)

  • Experience with Splunk (Required)

  • Experience with Incident Management and Response (Required)

  • Experience writing and communicating with customers (Required)

  • Degree in Information Security or Information Technology (Desired)

  • Demonstrate Subject Matter Expertise (SME) in at least one of the following areas:

  • Digital Forensics & Incident Response (DFIR)

  • Malware/Reverse Engineering

  • Network

  • Hunting/Threat Intelligence

  • Operating Systems

  • Web Application Security

  • Integrated Control Systems

  • Attacker Methodology

Posted By

Paul Wendell

15450 South Outer Forty Rd., Suite 270 Chesterfield, MO, 63017

Dice Id : SCIMO
Position Id : 6027271
Have a Job? Post it

Similar Positions

Splunk Engineer
  • Take2 Consulting
  • Mclean, VA
Senior Security Researcher
  • Capital TechSearch
  • Arlington, VA
Junior Splunk Engineer
  • Leidos
  • Alexandria, VA
Cloud Security Architect - Remote
  • Reston, VA
Security Administrator
  • IS Mavens Corporation
  • Bethesda, MD
Senior Cloud Security Engineer
  • CoStar Realty Information, Inc
  • Washington, DC
Information and Application System Security Engineer
  • Mclean Intelligence Workforce
  • Washington D.c., DC
Senior Security Engineer
  • ALTEK Information Technology, Inc
  • Washington D.c., DC
Data Security Engineer
  • Dynanet Corporation
  • District Of Columbia, DC
Application Security Analyst
  • Integrated Systems, Inc.
  • Washington, D.c., DC
Tier 3 SOC Analyst
  • Base One Technologies
  • Washington, DC
Senior Security Engineer
  • VariQ Corporation
  • Washington, DC
Tenable SME
  • AAC Inc
  • Bethesda, MD