Position Details
About this role
This role involves supporting the administration and maintenance of enterprise Splunk SIEM environments, onboarding log sources, developing dashboards, and assisting cybersecurity teams with log analysis in a remote federal setting.
Key Responsibilities
- Support Splunk environments
- Configure log ingestion and forwarders
- Onboard data sources
- Develop dashboards and reports
- Troubleshoot search and indexing issues
Technical Overview
The technical environment includes Splunk Enterprise, log ingestion, dashboards, search queries, Linux and Windows logs, network protocols, and troubleshooting of performance issues.
Ideal Candidate
The ideal candidate is a mid-level cybersecurity professional with 3+ years of experience in SIEM administration, specifically with Splunk Enterprise. They possess strong troubleshooting skills, experience onboarding log sources, and supporting security operations in a federal or government environment.
Must-Have Skills
Nice-to-Have Skills
Tools & Platforms
Required Skills
Hard Skills
Soft Skills
Certifications
Required
Preferred
Industry & Role
Keywords for Your Resume
Deal Breakers
Lack of experience with Splunk Enterprise or similar SIEM platforms, No experience onboarding log sources or configuring Splunk forwarders, Less than 3 years of relevant experience, Inability to obtain necessary security clearance if required
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile