This position is no longer open for applications

Certified Splunk Engineer

Job Description:

Certified Splunk Engineer Summary:

Signature Consultants is seeking a Certified Splunk Engineer for an opportunity in Blue Mound, TX. The preferred candidate will have experience as a team leader over other Security Analysts (peers and junior analysts). The Splunk Engineer should have experience in using SIEM technologies to support in-depth investigations and ‘hunting’ activities. He or she will support the customer security engineering/operations team. This position is a staff augmentation role in direct support (customer facing) of our customers in the transportation industry. The customer uses Palo Alto firewalls extensively for segmentation and perimeter security controls. Selected candidates will need to pass the eRailSafe screening process to meet the customer requirements. eRailSafe screening consists of a background check and basic safety and security training.

Responsibilities:

  • Configuration, management, monitoring, and reporting using with the firewalls
  • Perform ongoing development for additional use case and SIEM tuning
  • Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
  • Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment
  • Perform cyber defense trend analysis and reporting
  • Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack
  • Provide daily summary reports of network events and activity relevant to cyber defense practices
  • Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts
  • Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities
  • Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity
  • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information
  • Determine tactics, techniques, and procedures (TTPs) for intrusion sets
  • Recommend computing environment vulnerability corrections
  • Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings)
  • Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools
  • Reconstruct a malicious attack or activity based off network traffic
  • Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave
  • Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise
  • Provide cybersecurity recommendations to leadership based on significant threats and vulnerabilities

Qualifications:

  • Experience with SPLUNK Enterprise Security required
  • Hold SPLUNK Certified Architect credentials
  • 5+ years of SPLUNK experience in an Analyst role
  • Minimum of five years of Splunk experience using Splunk Enterprise Security
  • Splunk Certified Admin
  • Splunk Certified Architect a plus
  • Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies
  • Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute)
  • Knowledge of computer networking concepts and protocols, and network security methodologies
  • Knowledge of cybersecurity and privacy principles
  • Knowledge of cyber threats and vulnerabilities
  • Knowledge of encryption algorithms, cryptography, and cryptographic key management concepts
  • Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists)
  • Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins)
  • Knowledge of incident response and handling methodologies
  • Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption)
  • Knowledge of network traffic analysis methods
  • Knowledge of new and emerging information technology (IT) and cybersecurity technologies
  • Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL])
  • Knowledge of key concepts in security management (e.g., Release Management, Patch Management)
  • Knowledge of security system design tools, methods, and techniques
  • Knowledge of Virtual Private Network (VPN) security
  • Knowledge of what constitutes a network attack and its relationship to both threats and vulnerabilities
  • Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations
  • Knowledge of adversarial tactics, techniques, and procedures.
  • Knowledge of network tools (e.g., ping, traceroute, nslookup)
  • Knowledge of defense-in-depth principles and network security architecture
  • Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN)
  • Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip)
  • Knowledge of interpreted and compiled computer languages
  • Knowledge of cyber defense and information security policies, procedures, and regulations
  • Knowledge of the common attack vectors on the network layer
  • Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks)
  • Knowledge of cyber attackers (e.g., script kiddies, insider threat, nation/non-nation state sponsored)
  • Knowledge of system administration, network, and operating system hardening techniques
  • Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks)
  • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth
  • Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools
  • Signature implementation impact for viruses, malware, and attacks
  • Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump)
  • Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications
  • Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services
  • Knowledge of how to use network analysis tools to identify vulnerabilities
  • Knowledge of penetration testing principles, tools, and techniques
  • Skill in detecting host and network-based intrusions via intrusion detection technologies (e.g., Snort)
  • Skill in using protocol analyzers
  • Skill in collecting data from a variety of cyber defense resources
  • Skill in recognizing and categorizing types of vulnerabilities and associated attacks
  • Skill in reading and interpreting signatures (e.g., snort)
  • Skill in performing packet-level analysis
  • Scripting and software development skills like Python, JavaScript, JAVA, C++ etc.
  • 3rd party integration skills using REST, SOAP, XML and JSON API
  • Knowledge of automation and orchestration technologies and frameworks in a DevSecOps, like Ansible, netconf, yang, Puppet, Chef

About Signature Consultants, LLC

Headquartered in Fort Lauderdale, Florida, Signature Consultants was established in 1997 with a singular focus: to provide clients and consultants with superior staffing solutions. For the eighth consecutive year, Signature was voted as one of the “Best Staffing Firms to Work For” and is now the 15th largest IT staffing firm in the United States (source: Staffing Industry Analysts). With 26 locations throughout North America, Signature annually deploys thousands of consultants to support, run, and manage their clients’ technology needs. Signature offers IT staffing, consulting, managed solutions, and direct placement services. For more information on the company, please visit www.sigconsult.com.

Apply Now

To apply for this job, please complete the following 6 fields and we will immediately follow-up (* = required).

Choose File
.doc, .docx, .txt, .pdf, .html
Would you like to help us get to know you even better?

The intent of asking for the following information is to assist Signature in meeting its commitments to equal opportunity and affirmative action requirements. Completing and returning this section is purely VOLUNTARY on your part and will have absolutely no effect on the status of your employment application.

Signature Consultants is committed to providing reasonable accommodation to qualified individuals with physical and mental disabilities according to state and federal disability discrimination laws. If, because of a disability, you need assistance or a reasonable accommodation for any part of the employment process, please email hr@sigconsult.com or call 888-838-1020. Signature Consultants will partner with you in good faith to identify and implement a reasonable accommodation, if any, that is appropriate and consistent with its legal obligations.

Signature Consultants is an Affirmative Action and Equal Opportunity Employer, Minority/Female/Disabled/Veteran/Gender Identity/Sexual Orientation.

EEO is the law: http://www.dol.gov/ofccp/regs/compliance/posters/pdf/eeopost.pdf