Enable job alerts via email!

SOC Analyst / Splunk Administrator

Apex Systems

Washington (District of Columbia)

Hybrid

USD 70,000 - 110,000

Full time

2 days ago
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An innovative IT services company is looking for a SOC Analyst / Splunk Administrator to join their team. This hybrid role combines SOC analysis with Splunk engineering, focusing on security investigations and content creation. The ideal candidate will have a strong background in cyber threats and information security, along with hands-on experience in managing Splunk and developing dashboards. With a commitment to collaboration and continuous learning, this company offers a dynamic work environment where your contributions will significantly impact security operations. Join a team that values excellence and innovation in the ever-evolving field of cybersecurity.

Qualifications

  • 2-5 years of experience in network defense environments.
  • Strong analytical skills in incident handling and malware analysis.

Responsibilities

  • Administer Splunk and create custom content with SPL.
  • Conduct security investigations and manage data in a SIEM.

Skills

Splunk Administration
Security Investigations
Analytical Skills
Incident Response
Network Defense
Threat Analysis
Communication Skills

Education

Splunk Admin Certification
Relevant Security Certifications (Security+, CySA+, GCIA, GCIH)

Tools

Splunk Enterprise Security
FireEye
Palo Alto
MS O365

Job description

Apex Systems is seeking a SOC Analyst / Splunk Administrator to work partially remote and will be expected onsite in Washington, D.C. for 1 day per week.

Summary:

This position is a hybrid role designed to bridge SOC Analysis with Splunk Engineering and Content Creation. The candidate should have experience with administering Splunk, creating custom content with SPL, managing data in a SIEM, and conducting security investigations through Splunk ES.

The ideal candidate will have a solid understanding of cyber threats and information security, including TTPs, Threat Actors, Campaigns, and Observables, and be proficient in administering Splunk and creating dashboards and notables.

The candidate should also be familiar with tools commonly used in SOC environments, such as intrusion detection systems, SIEM platforms, endpoint threat detection tools, and security operations ticketing systems.

Requirements:

  • Must be a U.S. Citizen with the ability to obtain a Public Trust clearance.
  • Minimum 2-5 years of experience in network defense environments.
  • Splunk Admin Certification is required; 15+ years of experience can substitute for certification.
  • Strong analytical and technical skills in computer network defense, including incident handling, hunting, and malware analysis.
  • Experience analyzing security events to discern true positives, including event triage, investigation, and incident response.
  • Hands-on experience managing and optimizing Splunk Enterprise Security.
  • Experience managing data sources, onboarding new sources, and troubleshooting data issues.
  • Proficiency in creating dashboards, reports, and notable events.
  • Ability to develop rules, filters, signatures, and scripts to support detection efforts.
  • Strong logical and critical thinking skills for analyzing security events from various sources.
  • Excellent organizational skills and attention to detail in security workflows.
  • Knowledge of operating systems (Windows, macOS, Linux), Active Directory, network protocols, and internet standards.
  • Experience implementing security countermeasures in enterprise networks.
  • Strong written and verbal communication skills.

Desired Qualifications:

  • Experience researching emerging threats and developing monitoring content.
  • Experience with tools such as FireEye, Palo Alto, and MS O365.
  • Relevant certifications like Security+, CySA+, GCIA, GCIH.
  • Scripting or automation experience.
  • Familiarity with cloud security monitoring (AWS, Azure).

Education:

EEO Employer

Apex Systems is an equal opportunity employer. We do not discriminate based on race, color, religion, sex, age, sexual orientation, gender identity, national origin, or other protected characteristics. Qualified applicants with criminal histories will be considered in accordance with applicable law. For accommodations during the application process, contact our Employee Services Department.

Apex Systems is a global IT services company committed to innovation, collaboration, and continuous learning. We offer various career resources, training, certifications, and benefits. Our commitment to excellence has earned us awards such as ClearlyRated's Best of Staffing and Great Place to Work.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Splunk Administrator - 100% Remote

Creative Solutions Services, LLC

Herndon

Remote

USD 80,000 - 110,000

2 days ago
Be an early applicant

SOC Analyst / Splunk Administrator

Apex Systems

Washington

Hybrid

USD 80,000 - 110,000

4 days ago
Be an early applicant

Mid - SOC Analyst / Splunk Administrator

Leidos

Washington

Hybrid

USD 104,000 - 190,000

6 days ago
Be an early applicant

AWS Cloud Engineer - Splunk

Peraton

Herndon

Remote

USD 80,000 - 120,000

4 days ago
Be an early applicant

AWS Cloud Engineer - Splunk

Peraton

Remote

USD 70,000 - 110,000

2 days ago
Be an early applicant

AWS Cloud Engineer - Splunk

Peraton

Remote

USD 80,000 - 128,000

6 days ago
Be an early applicant

Splunk Architect - Remote

The Dignify Solutions, LLC

New York

Remote

USD 80,000 - 110,000

10 days ago

Security Content Engineer – Splunk

BlueVoyant

College Park

Remote

USD 80,000 - 120,000

30+ days ago

Sr. Site Reliability Engineer: Splunk Cloud Services

Splunk

North Carolina

Remote

USD 90,000 - 150,000

30+ days ago