Home

Splunk Admin at Remote, Remote, USA
Email: [email protected]
Splunk Admin

Hartford CT

Security Incident investigations, Incident Response, Splunk,
SIEM, SOAR, Threat Hunting

Ability to perform reactive & proactive security
analysis and articulate emerging threats to leadership and team

Situational awareness of cyber activity by reviewing open
source reporting for new vulnerabilities, malware, or other threats that have
the potential to impact the organization

Experience in directly working with the customer and
managing customer expectations, project deliverables in coordination with
onshore/nearshore/offshore team

Good knowledge & working experience on Splunk
administration & engineering, log management, event correlation, security
incident management, SIEM & SOAR.

Ability to preset a threat response for any critical
incidents.

Experience in defining alerts, reports and dashboards

Ability to prepare reports and present risk based view to
Clients

Expertise in SIEM & SOAR implementation by understanding
the customer environment.

2. Team management with good Information security technical
expertise and ability to frontend customer interactions

3. Experience in Security Incident Response Lifecycle

4. Experience in identifying & enabling SIEM & SOAR
functionality using Splunk.

5. Experience in defining SOC monitoring usecases and
operationalizing them through SOPs, and SIEM based alerts / reports.

6. Should understand the functioning of Security
Technologies including EDR, Firewalls, Intrusion Prevention, Packet Capture
tools, Remote access technologies etc.

7. Security incident investigations using Next-Gen AV/ EDR
solutions such as CrowdStrike, MS Defender, etc

8. Experience in understanding and interpreting Threat
intelligence from various external sources including validation of related IOCs
in customer environment.

9. Should have good conceptual understanding of Windows,
Linux operating systems & Networking TCP/IP Protocol Suite

10. Understanding of common network services (web, mail,
DNS, FTP, etc.), network vulnerabilities, and network attack patterns

11.Possess knowledge and experience in Threat Ecosystem,
remediating Malware, Rootkits and Botnets

12. Strong analytical and problem solving skills

13. Good organization skills to ensure coordination and
smooth hand-offs between onshore & offshore/nearshore teams

14. Strong communication (verbal and written) and
interpersonal skills

15. Project Management experience with an ability to mentor
the team and meet delivery objectives

Certifications preferred - CISSP, GCIH, GCFA, CHFI, CEH,
SEC+ Experience in custom integrations & automation. Executive briefing
& reporting skills with attention to detail

--

Keywords: information technology microsoft Connecticut
Splunk Admin
[email protected]
[email protected]
View all
Mon Aug 19 19:45:00 UTC 2024

To remove this job post send "job_kill 1670219" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 1

Location: ,