Home

Looking for Splunk Engineer || Hybrid (Pittsburgh PA, Everett, WA or Beaverton, Oregon) at Beaverton, Alabama, USA
Email: [email protected]
Only USC are workable

Hi,

My name is Sagar and I'm a Sr. Technical Recruiter at Diverse Lynx. We provide IT Consulting Services to our customers immediate and long-term resource needs. I am contacting you either because your resume has been posted to one of the internet jobs sites to which we subscribe or you had previously submitted your resume to Diverse Lynx. We

now find

your resume

matching

 for Splunk Engineer. with

our client at Hybrid (Pittsburgh PA, Everett, WA or Beaverton, Oregon).

The job description is

Job Title:
Splunk Engineer

Location :

Hybrid (Pittsburgh PA, Everett, WA or Beaverton, Oregon)

Duration: Long term

Job description

Job Title: Security Operations Senior Analyst / SOC L3 role

Job Description:

We require an 8+ Years experienced SOC professional who will be responsible for working on escalated events, evidence collection, analyse, perform forensic investigation, find the root cause of the incident, provide trouble shooting steps.

The primary function of this position is to work as a SPLUNK Expert who can perform alert management, high level investigation which includes but not limited to log analysis, forensic evidence collection, analysis, find the root cause and provide remediation steps.

This role reports to the SOC Manager.

Responsibilities:

Monitoring client security infrastructure, identifying and reporting real time attacks and vulnerabilities on the client network.

Identification of incidents and subsequent analysis and investigation to determine their severity and the response required.

Perform deep dive analysis for escalated incidents, forensic evidence collection

Help L1 and L2 team for triage incidents

High level investigation which includes but not limited to log analysis/forensic evidence collection and analysis

Collection of necessary logs that could help in the incident containment and security investigation and resolution

Triage complex threats and alerts.

Undertake first stages of false positive and false negative analysis

Fine tune policies for reducing false positives

Integrate new devices to Splunk

Run various queries to generate the required reports

Work on new use case integration

Understand the structure and the meaning of logs from different log sources such as FW, IDS, Windows DC, Cisco appliances, AV and antimalware software, email security etc.

Understand the subject of Carbon Black alarms and perform deeper analysis

Should have ServiceNow and other ticketing tools experience

Should be able to fetch various Splunk and ServiceNow reports.

Should be able to have better coordination with Splunk vendor and other stake holders

Years of Experience:       12.00 Years of Experience

--

Keywords: access management information technology Pennsylvania Washington
[email protected]
View all
Wed Dec 20 00:36:00 UTC 2023

To remove this job post send "job_kill 952272" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 1

Location: ,