| Only Baltimore or nearby Consultants, no relocation profiles : Sr. Splunk Engineer :: Baltimore, MD (Hybrid Role) :: Contract Opportuinty at Baltimore, Maryland, USA |
| Email: [email protected] |
|
http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=858298&uid= From: Akshat Gupta, Valiantica Inc. [email protected] Reply to: [email protected] Hello, I hope this email finds you well. This is Akshat Gupta from Valiantica Inc. This email is a reference to jobs Sr. Splunk Engineer go through the job descriptions and let us know if you are interested in the same. Please reply with your updated resume and expected compensation. Position- Sr. Splunk Engineer Location- Baltimore, MD (Hybrid Role) Interview- Phone and Skype Duration- Contract Opportunity SIEM Content Developer / Security Analytics Content Developer The hiring manager is looking for a Security Analytics Developer with 3+ years of experience who embodies a true passion for security and approaches research and innovative threat detection with a proactive mindset, especially concerning intelligence and emerging threats. Essential qualifications include proficiency in Splunk, including Splunk Processing Language (SPL), as well as a solid working knowledge of Linux systems. A crucial attribute for effective threat detection is familiarity with various network and security log sources. This role is situated within our Security Operation Centre (SOC), offering an exciting opportunity for the chosen candidate to contribute their expertise to a dynamic environment dedicated to upholding robust security measures. You will collaborate with technologists from across the business including architects, developers, security analysts and other engineers. You will focus on developing analytics, playbooks, and integrations to automate manual efforts that cuts across several security pillars including endpoint protection, data protection, network & application security, email protection, cloud and identity access management. Responsibilities: Researching and developing new threat detection use cases based on intelligence and research into emerging threats. Management and development of security analytics and correlation rules Work alongside incident response analysts to improve the detection time and response for security incidents Design dashboards to capture metrics from the SOC Generate appropriate alerting within SIEM to trigger investigations Collaborate with the platform team on the normalization of incoming log sources and events Participate in Incident Response activities. Research and implement new analytics and playbooks that can be used within the SOC/IR teams Develop playbooks and automation in SOAR to accelerate IR activities (Desirable) Security automation, log analysis, continuous monitoring and managing a SIEM Deploy automation throughout the security response organization to improve the overall operational effectiveness Work alongside our SOC and IR analysts and threat hunting analysts to design response actions to newly created detection rules Required Skills & Qualifications Passionate interest in cyber security Bachelors Degree in Computer Science, Engineering, or related discipline; or equivalent combination of work experience and certifications. Solid experience with Splunk Search Processing Language (SPL) Familiarity with standard security frameworks including Mitre ATT&CK, and Cyber Kill Chain Strong interpersonal skills, both written and oral and ability to communicate complex ideas to all levels of the business. Experience working within a Security Operation Centre (SOC) Experience in SIEM content development and tuning alerts Working knowledge of Linux administration Good understanding of network and security log sources, and log normalization Supporting Incident response with analysis of data Desired Job Skills Experience Splunk Enterprise and ES or other SIEM platform Hands-on experience with multiple programming/scripting languages, including Python and Bash Previous experience with resilient streaming technologies such as Apache Kafka and Apache Nifi. Experience with multiple cloud technologies and security appliances Good understanding of Splunk Awareness of networking protocols and technologies Good understanding of HTTP, REST APIs, JSON and syslog data format Security tool FAQ and Support Documentation Hands-on experience with SOAR Experience creating playbooks to respond to security incidents Thanks, Akshat Gupta Valiantica Inc. 888 Saratoga Ave. #210 San Jose, CA 95129 Email ID: [email protected] URL: www.valiantica.com Keywords: golang California Idaho Maryland http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=858298&uid= |
| [email protected] View All |
| 09:22 PM 15-Nov-23 |