What are the responsibilities and job description for the Splunk Cyber Security Engineer - Hybrid position at cyberThink, Inc?
Job Description:
As a Splunk Cyber Security Engineer, you will be responsible for managing and engineering data ingestion into the Client Splunk instance. This includes configuring and maintaining data sources, onboarding new ingestion sources, and ensuring the backend of Splunk is properly maintained throughout the Client Operations Technology Network. You will play a critical role in the proper integration of log data, the management of indexes, and the continuous upkeep of Splunk’s operations.
Key Responsibilities:
Required Skills, Experiences, Education, and Competencies:
The hourly range for roles of this nature are $50.00 to $80.00/hr. Rates are heavily dependent on skills, experience, location, and industry.
cyberThink is an Equal Opportunity Employer.
As a Splunk Cyber Security Engineer, you will be responsible for managing and engineering data ingestion into the Client Splunk instance. This includes configuring and maintaining data sources, onboarding new ingestion sources, and ensuring the backend of Splunk is properly maintained throughout the Client Operations Technology Network. You will play a critical role in the proper integration of log data, the management of indexes, and the continuous upkeep of Splunk’s operations.
Key Responsibilities:
- Manage and maintain Splunk backend, including the management of indexes.
- Onboard new log sources and indexes as needed, ensuring proper data ingestion.
- Modify and adjust current log sources to ensure proper integration with the Splunk instance.
- Install, update, and maintain Splunk apps and add-ons to support required functionalities.
- Research and implement new Splunk add-ons and tools as required.
- Perform ongoing Splunk change management and maintenance activities to ensure optimal performance.
- Understand and manage network data flows to ensure effective data ingestion.
- Maintain and troubleshoot Linux Syslog, including log rotation and syslog services.
- Provide Red Hat Linux administration, including security patching and system updates.
- Deploy Splunk updates and configurations across the network.
- Be on-call for Splunk-related outages, providing prompt response and resolution.
Required Skills, Experiences, Education, and Competencies:
- Extensive experience with Splunk core, ES, and management of Splunk indexes.
- In-depth knowledge of network data flows and how they relate to Splunk ingestion.
- Proficiency in Linux Syslog administration, including log rotation and syslog services.
- Strong experience with Red Hat Linux administration, including updates and security patching.
- Ability to deploy and maintain Splunk configurations, including apps and add-ons.
- Experience with Splunk Gov Cloud, if applicable.
- Knowledge of change management processes and procedures.
- On-call experience for troubleshooting and resolving Splunk-related outages.
The hourly range for roles of this nature are $50.00 to $80.00/hr. Rates are heavily dependent on skills, experience, location, and industry.
cyberThink is an Equal Opportunity Employer.
Salary : $50 - $80