Job Locations
US-VA-Rosslyn
ID |
2025-9357
|
Category |
*Hot Jobs
|
Type |
Regular Full-Time
|
Overview
Credence is one of the largest privately held technologies services company in the country, repeatedly recognized as a top place to work, and have been on the Inc. 5000 Fastest Growing Private Companies list for the last 12 years. We practice servant leadership and believe that by focusing on the success of our clients, team members, and partners, we all achieve greater success. At Credence, we support our clients' mission-critical needs, powered by technology. We provide cutting-edge solutions, including AI/ML, enterprise modernization, and advanced intelligence capabilities, to the largest defense and health federal organizations. Through partnership and trust, we increase mission success for warfighters and secure our nation for a better future. Position Summary We are activly seeking a Splunk Engineer to design, implement, deploy, and manage complex Splunk environments for a highly complex Department of State organization. You will customize Splunk to meet specific use cases and requirements. You will develop and maintain Splunk dashboards and create reports tailored to the needs of different teams and stakeholders. You will be in charge of monitoring indexing performance, search performance, and data ingest. You will have to be proactive in identifying and resolving Splunk system and performance issues. You will analyze and conduct research to determine a cyber criminal's capabilities, intentions, and attack approaches, including those with multiple phases. In addition, you will be responsible for supporting the remediation of any discovered threats, and providing incident response capabilities when necessary. This role will require you to stay up-to-date with the latest Splunk features, enhancements, and industry trends and manage relationships with Splunk vendors to stay informed about new products and offerings.
Responsibilities include, but are not limited to the duties listed below
Create, manage, and support automation solutions for Splunk orchestration
- Use the SIEM, EDR, IDS, and other tools to conduct cyber threat hunts
- Rapidly respond to incidents to minimize risk exposure and ensure system availability; proactively monitor internal and external-facing environments
- Identify attacker tools, tactics, and procedures to develop indicators of compromise. Form and articulate expert opinions based on findings and analysis
- Seek opportunities to automate detection and remediation and reduce response times for incidents
- Provide incident response support and coordination, including investigating security incidents and coordinating with other teams to contain and remediate the incident.
- Leverage Splunk to create advanced search queries and reports to monitor system performance, security threats, and operational metrics.
- Collaborate and support inquiries from cross-functional internal and external stakeholders such as system administrators, compliance, and data engineering teams, to ensure documentation is complete and in compliance with information security policies
- Manage and support the development of security operations playbooks to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats
- Evaluate third-party products and services to verify they meet security and compliance requirements
- Familiarity with log management, event correlation, and data analysis concepts.
- Drive improvements in technical architecture, standards, and processes to meet company objectives and best security practices
- Develops technical solutions to verify compliance with required technical controls autonomously
- Present findings/reports to stakeholders on a weekly basis
- Perform log analysis, parsing, indexing, and analyzing machine data logs to extract actionable insights.
- Perform upgrades and patch management to keep Splunk environments up-to-date and secure.
- Design intuitive and customizable dashboards to visualize data trends.
Education, Requirements and Qualifications
- Must be a US Citizen with the ability to obtain and maintain a Secret clearance. Active Secret Clearance preferred
- Masters Degree from an accredited university or equivalent combination of education in Computer Science, Information Technology, or a related field with 5 to 7 years of experience
Equivalent combination of education, technical training and certification (CISSP, C|EH, GIAC GREM, GCTI, GCFR, GCFA, Splunk Certified Cybersecurity Defense Analyst, Splunk Enterprise Security Certified Admin) and/or work experience; knowledgeable about configuring Splunk for security and compliance requirements, including FISMA, SOC 2, HIPAA, and GDPR. - Experience in building Splunk Technology Add-ons and configuring field extractions for various data sources
- Strong experience working with Splunk, including architecting and implementing Splunk solutions in large-scale environments.
- Proficiency in SPL (Search Processing Language) for creating complex queries, reports, and dashboards in Splunk.
- Experience in designing, developing, testing, troubleshooting, deploying, and maintaining Splunk solutions, reporting, alerting, and dashboards
- Extensive knowledge of a tier Splunk installation: indexers, forwarders, search heads, clusters
- Experience analyzing system, network, and application logs for attack techniques at all stages of the cyber kill chain
- Experience with more than one or more enterprise-scale EDR and SIEM tool
- Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways.
- Strong analytical and critical thinking skills to identify and address complex data and system issues.
- Strong problem-solving skills to investigate and resolve Splunk platform and data ingestion issues.
- Strong communicator and collaborator, able to work closely with cross-functional teams.
- Knowledgeable in using scripting languages (e.g., Python) and Splunk's built-in scripting to automate routine tasks.
- Detail-oriented with a strong commitment to documenting configurations, processes, and best practices.
- Familiarity with ServiceNow cloud offering and log ingestion to Splunk.
Working Conditions and Physical Requirements
Please join us, as together we build a better world one mission at a time powered by Technology and its People! This position is onsite in Rosslyn VA. #LI-Onsite #Credence #veteranemployment #militaryspouse #milspouse #hireavet #militaryveteran #militaryfriendly #transitioningmilitary #veterans #militarytransition #militaryfamilies #msep #militarytocivilian #military #federalcontractingjobs #defensecontracting #defenseindustryjobs
Need help finding the right job?
We can recommend jobs specifically for you!
Click here to get started.
|