What are the responsibilities and job description for the Sr. Splunk Enterprise Security App Dev/Administrator (Remote) position at ITmPowered, LLC?
Sr. Splunk Enterprise Security App Dev / Administrator (Remote) - ITmPowered
Sr. Splunk Enterprise Security Developer Administrator will develop, create, integrate, and administer a highly advanced Splunk Security application (eSAR) developed internally to detect improper access to protected data by employees and malicious user activity. Develop Splunk Apps and add-ons in support of Security Access cyber threat monitoring, threat management and data compliance across numerous business critical enterprise applications. Develop advanced Splunk ES Application functionality. Work with Splunk Developers using Agile development and administration using Agile project management methodologies. Work with the Splunk Engineering team, and support Splunk development, data integrations, and application administration using Agile methodologies. Splunk Enterprise Certified Architect OR Splunk Certified Developer required. Splunk Core Certified Consultant Preferred.
RESPONSIBILITIES :
- Administering Splunk and Splunk App for Enterprise Security (ES) log management, ingestion, normalization.
- Advanced Splunk analytics and the development and administration of custom Splunk applications.
- Splunk data integrations with business-critical enterprise applications and systems.
- Translating feedback from the business to Splunk technical requirement and solutions.
- Develop specialized Splunk Security and Compliance applications, add-ons, data models, dashboards, content using Python, Splunk SPL, Splunk SimpleXML (OR JavaScript, CSS), Bash.
- Develop custom Splunk applications and Add-Ons for inclusion of access events per use case criteria.
- Leverage Modular design to onboard access / security logging applications and include in incident scoring.
- Onboard access logging applications via modular design
- Develop Splunk Risk scoring based on compliance conditions to determine suspicious access events.
- Develop custom risk scoring to weed out white noise and only show actionable incidents to SOC Analysts.
- Develop Dashboards for Security Analysts with detailed drill down capability for incident response.
- Develop triage workflows for analysts to assign and track ongoing investigations.
- Develop summary indexing enrichment of access events with IAM data, Application data, Break-the-Glass logs.
- Aggregate access event data for specific criteria.
- Enable fast searching across fully enriched access events over long periods of time.
- Develop Break-the-Glass correlations in Splunk for contextual user access / app data mapping & monitoring.
Skills and experience :
Required Experience : In addition to active Splunk certification(s), must also have experience with the following :
Soft skills
LOGISTICS :