Enable job alerts via email!

Splunk Detection Engineer

Myticas Consulting

Illinois

Remote

USD 90,000 - 120,000

Full time

Today
Be an early applicant

Job summary

A technology consulting firm is seeking a Splunk Detection Engineer for a 100% remote contract position. The role involves improving security logging capability and includes responsibilities such as integrating data sources, configuring logs, and collaborating with cybersecurity analysts. A strong background in Splunk is required, along with excellent analytical and communication skills.

Qualifications

  • Significant experience with Splunk and Splunk Enterprise Security.
  • Comfort with regex, JSON, and APIs.
  • Strong analytical and problem-solving skills.

Responsibilities

  • Integrate new data sources with IT administrators.
  • Create and maintain new Splunk apps.
  • Assist users with creating searches and dashboards.

Skills

Splunk
Event logging solutions
Analytical skills
Problem-solving skills
Communication skills

Tools

Linux CLI
Git
Python
PowerShell
Bash
Job description
Overview

One of Myticas Consulting's direct clients is seeking a Splunk Detection Engineer for a 100% Remote contract position.

NOTE: Must be a US Citizen.

The CSPO is seeking a Splunk Detection Engineer to help improve our security logging capability. The Splunk Detection Engineer will play an important role in ensuring that security logs are appropriately formatted, ingested, tagged, and used to detect possible security events.

Typical tasks may include:

  • Integrate new data sources, which may include databases, APIs, files, etc. This may involve setting standards and working with IT administrators to update their configurations
  • Validating and creating appropriate configurations for CIM compliant logs
  • Processing requests from cybersecurity analysts for new detections within Splunk Enterprise Security
  • Analyzing existing logs to identify poorly formatted logs and potential gaps when implementing new detections
  • Adding and maintaining threat feeds within Splunk Enterprise Security
  • Monitoring the performance of and tuning detections
  • Managing asset and identity inventory within Splunk Enterprise Security
  • Creating and maintaining new Splunk apps
  • Recommending additions or changes to Splunk or its data models to meet detection needs
  • Developing searches, reports, and other functionalities for cyber-based use-cases, including active response, intrusion detection, vulnerability management, and related use cases
  • Assisting users with creating and optimizing searches and dashboards and mentoring others in good development of said resources
  • Attend online/Teams meetings with team and others as appropriate
  • Work with team to provide status on current task, suggest improvements, discuss implementation, etc.
Minimum Qualifications
  • Significant experience with Splunk and Splunk Enterprise Security
  • Significant experience with event logging solutions (e.g., Splunk Universal Forwarder, syslog, Cribl)
  • Experience with ticketing/case management
  • Experience with Git pipelines
  • Familiarity with using Linux CLI
  • Ability to craft queries using common languages; comfort with regex, JSON and APIs; basic scripting in Python/PowerShell/Bash
  • Excellent analytical, problem-solving, and communication skills both with stakeholders, peers, and internal customers; able to operate under pressure in a shift or on-call environment
Preferred Additional Qualifications
  • Strong grasp of TCP/IP, OSI model, and common protocols (HTTP, DNS, SMTP). Windows/Linux/macOS fundamentals; Active Directory/Azure AD concepts; basic cloud logging
  • Experience in system and network administration
  • Relevant cybersecurity experience including investigations and data analysis
  • Experience with SOAR tools and automation development
  • Experience using identity security/management tools (e.g., Entra ID, Active Directory, Shibboleth, CrowdStrike Identity Protection)
  • Cloud security experience (e.g., CloudTrail/GuardDuty, Azure Defender/M365, GCP Security Command Center)
Relevant certifications (nice to have)
  • Security+, CySA+, SSCP; Microsoft SC-200/AZ-500; Splunk Core/Enterprise Security (Splunk Enterprise Security Certified Admin; Splunk Core Certified Consultant; Splunk Certified Cybersecurity Defense Analyst; Splunk Certified Cybersecurity Defense Engineer; Splunk Enterprise Certified Admin; Splunk Enterprise Certified Architect); GIAC (GCIH, GCIA, GCFA, GCTI); cloud provider security certs
Experience
  • Considerable knowledge using and administering Splunk
  • Staying up to date with the latest cybersecurity threats, vulnerabilities, and best practices
  • Strong analytical and problem-solving skills
  • Meticulous attention to detail to ensure thorough assessments and accurate reporting
  • Excellent written and verbal communication skills to effectively convey findings and recommendations to technical and non-technical stakeholders
  • Ability to work collaboratively with other cybersecurity professionals, IT staff, and external vendors
  • Experience and skill in conducting audits or reviews of technical systems
  • Experience working in a government environment
  • Experience working in a distributed IT environment
  • Ability to qualify for HSPD-12 card for use in two-factor authentication
  • Able to work both independently and as a contributing member of a small technical team
  • Able to disseminate knowledge to current staff
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.