Splunk Security Engineer

Company:  Leidos
Location: Suitland
Closing Date: 02/11/2024
Salary: £125 - £150 Per Annum
Hours: Full Time
Type: Permanent
Job Requirements / Description

Description

Are you looking for an exciting job opportunity that will allow you to use your skills and expertise to make a real difference? The National Security Sector has just the role for you! We are seeking for a Splunk Security Engineer to join our team at the National Maritime Intelligence Center in Suitland, MD. In this dynamic position, you will have the chance to work across projects and teams to provide support for the Office of Naval Intelligence's (ONI) Defense Cyber Operations mission. Your daily activities will directly impact real-world operations and assist utilizing Security Information Event Management platforms to support threat detection, compliance, and security incident management through the collection and analysis (both near real-time and historical) of security events, as well as a wide variety of other event and contextual data sources.

What you will do:

  • Analyze log events and other data across disparate sources; implement and leverage the latest operational capabilities (such as incident management, dashboards, and reporting); as well as Security Orchestration, Automation, and Response (SOAR) in order to resolve anomalous activity in a prescribed, repeatable, and automated fashion.
  • Work with stakeholders directly to build, design, deliver, re-write, and maintain efficient, reusable, and reliable security automations using Splunk SOAR.
  • Create custom content and playbooks that interact with other tools/devices on the network to automate security response actions based on alerts / threats.
  • Configure, use and maintain a stack of deployed detection technologies; ticketing system integrations, SIEM integration (i.e., Splunk Enterprise Security); Splunk Enterprise Security detections that use Risk-Based Alerting (RBA); deployment of common detection technologies across common control points, including endpoint, network, email and cloud; stream of sources identified for threat intelligence integration; identity and access management tool deployment; API compatibility across existing technologies.
  • Be responsible for the lifecycle of an automation playbook, from requirements gathering and planning to design, testing, implementation, and maintenance.
  • Create detailed technical documentation pertaining to SOAR automations and collaborate with other internal teams as part of setting up SOAR integrations.

Basic Qualifications:

  • Bachelor's degree with 7+ years of related work experience. Additional years of experience, certifications or trainings may be considered in lieu of degree.
  • Active DoD TS/SCI clearance.
  • Current IAT Level II DoD Approved 8570-M Baseline Certification (e.g. Security+ce or equivalent) or the ability to obtain within 30 days from date of offer of acceptance.
  • 5+ years of demonstrated experience in in Splunk Security Orchestration, Automation, and Response (SOAR)/Phantom, including developing playbooks, implementing integrations and troubleshooting.
  • Deep understanding of Splunk Administration (not just user knowledge).
  • Experience performing software integrations with Trellix, Cisco, Exchange, and Windows and Linux.
  • 2+ years of hands-on experience using Splunk for both searching data and data analysis and for passing data to SOAR.
  • Hands-on knowledge of programming languages, APIs, and integrations to include strong programming skills in Python for automation.
  • Process improvement experience.

Preferred Qualifications:

  • Current IAT Level III DoD Approved 8570-M Baseline Certification (e.g. CISSP or equivalent)
  • Splunk Certified Enterprise Security Administrator
  • Experience with modeling languages like UML for structure, behavior, and interaction diagrams.
  • Ability to use Jira and ServiceNow for ticket tracking.
  • Technical writing skills for creating Standard Operating Procedures (SOPs) and other supporting documentation.
  • Completion of both "Developing SOAR Playbooks” and "Advanced SOAR Implementation” Training courses from Splunk.
  • Experience in Security Operations Center (SOC) workflows and the processes for alert triage, defining incident investigation at varying levels of severity, capturing critical metrics to measure SOC effectiveness, evaluating lessons learned after critical incidents, leveraging metrics for operational improvement, use standard incident response methodologies.
  • Experience in integrating MITRE ATT&CK detection framework.

#J-18808-Ljbffr
Apply Now
Share this job
Leidos
  • Similar Jobs

  • Splunk Security Engineer with Security Clearance

    Suitland
    View Job
  • Splunk Engineer

    Alexandria
    View Job
  • Splunk Engineer

    Alexandria
    View Job
  • Splunk Engineer

    Alexandria
    View Job
  • Splunk Engineer Jr.

    Alexandria
    View Job
An error has occurred. This application may no longer respond until reloaded. Reload 🗙