Description

Description:

The selected candidate will be responsible for:
•    Splunk administration support, including operation and maintenance of the log aggregation and Security Information and Event Management (SIEM) platform.
•    Perform systems analysis, modify, and update systems and related data ingestion parameters based on results of analysis, deploy applications and tools, perform testing of deployed applications and tools, and communicate updates to the customer.
•    Establish and maintain configuration and technical support, assist in the technical design process, and provide guidance/direction to customer on how to best get value from Splunk products.
•    Maintain, upgrade, and troubleshoot SPLUNK servers, clusters, and management systems.
•    Install, upgrade, and maintain required SPLUNK applications and add-ons.
•    Provide performance and license tuning for systems and troubleshoot SPLUNK components across multiple network environments.
•    Provide solution engineering support to ensure systems and components meet current and future standards.
•    Develop, create, deploy, and manage custom SPLUNK monitors, alerts, and dashboards.
•    Monitor SPLUNK for cluster status, health status, and other issues, and resolve as needed.
•    Manage patching and updates of Splunk hosts and/or Splunk application software.
•    Monitor and audit configurations and participate in the Change Management process to ensure that unauthorized changes do not occur.
•    Build and integrate contextual data into notable events.
•    Design, develop, recommend, and implement Splunk dashboards and alerts in support of the Incident Response team.
•    Develop advanced scripts for the manipulation of data to support analyst requirements.
•    Provide recommendations and implement changes to optimize Splunk in the environment.
•    Perform integration activities to connect with 3rd party software APIs.
•    Recommend innovative solutions to management and key stakeholders.
•    Manage automating Splunk deployments and orchestration.

Qualifications
•    At least five (5) years of experience with Splunk implementing and administering Splunk and Splunk Enterprise Security
•    Experience writing Splunk queries in Splunk Programming Language (SPL)
•    Certified Splunk Enterprise Administrator or Certified Splunk Administrator
•    Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps.
•    Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology.
•    Experience developing in any of the languages Bash, Perl, Shell, Powershell, SQL, D3, HTML, XML, CSS, Bash, JAVA and/or Python scripts.

SkillRequired / DesiredAmountof Experience
Bachelor's degree in computer science, management information systems, or related field combined with experienceRequired  
Experience in AWSRequired4Years
Experience as a System AdministratorRequired4Years
Experience in public cloud environments, including AWS and/or AzureRequired4Years
Experience with automation using an established framework (SaltStack, Puppet, Chef, Ansible, etc.)Required4Years
Experience in Splunk AdministrationRequired5Years
Strong system administration experience in Windows and Linux environmentsRequired  
Experience writing Splunk queries in Splunk Programming Language (SPL)Required4Years
Experience developing in any of the languages Bash, Perl, Shell, Powershell, SQL, D3, HTML, XML, CSS, Bash, JAVA and/or Python scripts.Required4Years
Certified Splunk Enterprise Administrator or Certified Splunk Administrator (MUST UPLOAD CERTIFICATION)Required  


 

Education

Any Gradute