Description
We are seeking an experienced SIEM Administrator to manage the full lifecycle of our Splunk Enterprise Security (ES) platform. In this role, you will be responsible for the deployment, configuration, and maintenance of a robust Splunk architecture, ensuring comprehensive security visibility across our hybrid infrastructure. You will onboard diverse log sources, create and fine-tune correlation searches mapped to the MITRE ATT&CK framework, and build real-time dashboards for threat detection. The ideal candidate will excel at system optimization, performance tuning, and troubleshooting. A key part of your role will be to drive automation by integrating Splunk with SOAR platforms and developing scripts to enhance SOC efficiency. You will also be responsible for generating compliance reports and supporting audit requirements, collaborating closely with SOC analysts to strengthen our security posture.
Requirements
1. 7–8 years of hands-on experience in Splunk Enterprise Security (ES) administration.
2. Proven expertise in deploying and maintaining Splunk components including Search Heads, Indexers, and Forwarders.
3. Advanced proficiency in Splunk Processing Language (SPL) for complex query development, dashboard creation, and alerting.
4. Demonstrated experience in onboarding, parsing, and normalizing diverse log sources (e.g., network, firewall, endpoint, cloud).
5. In-depth knowledge of the MITRE ATT&CK framework and experience applying it to create high-fidelity detections.
6. Strong understanding of Unix/Linux operating systems, networking protocols, and security principles.
7. Experience with Splunk performance tuning, index optimization, and license management.
8. Must hold a current Splunk Certified Administrator, Architect, or Power User certification.
Desirable
1. Experience integrating Splunk with SOAR platforms, particularly Splunk SOAR (Phantom).
2. Familiarity with compliance and audit reporting for frameworks like ISO 27001, QCB, or NIA.
3. Professional security certifications such as Security+, CEH, or GCIH.
4. Experience configuring Splunk SmartStore and data-tiering for cost and retention optimization.
5. Skills in scripting languages (e.g., Python, Bash) for automation.
Role Highlights
💼 Work Location Type
Onsite