Home

Only Baltimore or nearby Consultants, no relocation profiles : Sr. Splunk Engineer :: Baltimore, MD (Hybrid Role) :: Contract Opportuinty at Baltimore, Maryland, USA
Email: [email protected]
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=858298&uid=

From:

Akshat Gupta,

Valiantica Inc.

[email protected]

Reply to: [email protected]

Hello,

I hope this email finds you well.

This is Akshat Gupta from Valiantica Inc. This email is a reference to jobs
Sr. Splunk Engineer go through the job descriptions and let us know if you are interested in the same. Please reply with your updated resume and expected compensation.

Position- Sr. Splunk Engineer

Location- Baltimore, MD (Hybrid Role)

Interview- Phone and Skype

Duration- Contract Opportunity

SIEM Content Developer / Security Analytics Content Developer

The hiring manager is looking for a Security Analytics Developer with 3+ years of experience who embodies a true passion for security and approaches research and innovative threat detection with a proactive mindset, especially concerning intelligence and emerging threats. Essential qualifications include proficiency in Splunk, including Splunk Processing Language (SPL), as well as a solid working knowledge of Linux systems. A crucial attribute for effective threat detection is familiarity with various network and security log sources. This role is situated within our Security Operation Centre (SOC), offering an exciting opportunity for the chosen candidate to contribute their expertise to a dynamic environment dedicated to upholding robust security measures.

You will collaborate with technologists from across the business including architects, developers, security analysts and other engineers. You will focus on developing analytics, playbooks, and integrations to automate manual efforts that cuts across several security pillars including endpoint protection, data protection, network & application security, email protection, cloud and identity access management.

Responsibilities:

Researching and developing new threat detection use cases based on intelligence and research into emerging threats.

Management and development of security analytics and correlation rules

Work alongside incident response analysts to improve the detection time and response for security incidents

Design dashboards to capture metrics from the SOC

Generate appropriate alerting within SIEM to trigger investigations

Collaborate with the platform team on the normalization of incoming log sources and events

Participate in Incident Response activities.

Research and implement new analytics and playbooks that can be used within the SOC/IR teams

Develop playbooks and automation in SOAR to accelerate IR activities (Desirable)

Security automation, log analysis, continuous monitoring and managing a SIEM

Deploy automation throughout the security response organization to improve the overall operational effectiveness

Work alongside our SOC and IR analysts and threat hunting analysts to design response actions to newly created detection rules

Required Skills & Qualifications

Passionate interest in cyber security

Bachelors Degree in Computer Science, Engineering, or related discipline; or equivalent combination of work experience and certifications.

Solid experience with Splunk Search Processing Language (SPL)

Familiarity with standard security frameworks including Mitre ATT&CK, and Cyber Kill Chain

Strong interpersonal skills, both written and oral and ability to communicate complex ideas to all levels of the business.

Experience working within a Security Operation Centre (SOC)

Experience in SIEM content development and tuning alerts

Working knowledge of Linux administration

Good understanding of network and security log sources, and log normalization

Supporting Incident response with analysis of data

Desired Job Skills

Experience Splunk Enterprise and ES or other SIEM platform

Hands-on experience with multiple programming/scripting languages, including Python and Bash

Previous experience with resilient streaming technologies such as Apache Kafka and Apache Nifi.

Experience with multiple cloud technologies and security appliances

Good understanding of Splunk

Awareness of networking protocols and technologies

Good understanding of HTTP, REST APIs, JSON and syslog data format

Security tool FAQ and Support Documentation

Hands-on experience with SOAR

Experience creating playbooks to respond to security incidents

Thanks,

Akshat Gupta

Valiantica Inc.

888 Saratoga Ave. #210

San Jose, CA 95129

Email ID:

[email protected]

URL:

www.valiantica.com

Keywords: golang California Idaho Maryland
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=858298&uid=
[email protected]
View All
09:22 PM 15-Nov-23


To remove this job post send "job_kill 858298" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.

Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]


Time Taken: 8

Location: Baltimore, Maryland