Senior Splunk Engineer (Top Secret) Position Available In Madison, Alabama
Tallo's Job Summary: ALTA IT Service is hiring a Senior Splunk Engineer with a Top Secret clearance for a customer site in Huntsville, AL. Responsibilities include enhancing SIEM strategy, configuring alerts, and collaborating with incident response teams. Minimum qualifications include 7 years of IT experience, 3 years in cybersecurity, and 2 years of Splunk experience. Preferred certifications include GIAC Continuous Monitoring Certification and GIAC Certified Incident Handler. Active Top Secret clearance with SCI eligibility is required.
Job Description
Cyber Security Engineer (Splunk) – Senior and SME level positions available Top Secret Clearance is required Huntsville, AL ALTA IT Service is seeking a highly skilled and knowledgeable CyberSecurity Engineer – Senior Level to support a 24x7x365 Watch Floor team and safeguard the confidentiality, integrity, and availability of an organization’s information assets. This position is located on a customer site in Huntsville, AL or Clarksburg WV. Responsibilities include but are not limited to:
- Develop, upgrade, and enhance the enterprise Security Information and Event Monitoring (SIEM) strategy and tool implementation via Splunk, design data flow diagrams and alert feed architectures to ensure seamless alert integration
- Develop and maintain SIEM architecture, including data sources, log management, and alerting mechanisms
- Configure tools, settings, alerts, and notifications to improve the enterprise security and resilience capabilities, including implementation of Security Orchestration and Automation for Response (SOAR) and Endpoint Detection and Response (EDR) capabilities.
- Develop content for rule implementation on network border devices (firewalls, routers, switches, IDS/IPS, Taclanes, etc.)
- Monitor security events and alerts, conducting detailed analysis to identify potential security incidents
- Participates in response activities to all major enterprise outages. Provide technical guidance and support to junior analysts and other team members. Stay current with the latest SIEM technologies, cyber threats, and best practices
- Work and collaborate with incident response teams to investigate and remediate security incidents.
Minimum Qualifications:
- Bachelor’s degree, preferably in an IT-related or cybersecurity discipline.
- Possess a minimum of 7 years IT related experience; preferably minimum of 3 years in cybersecurity.
- Minimum 2 years of hands-on experience with Splunk.
- Minimum of 1 years of hands-on experience with Crowdstrike EDR or Palto Alto XDR.
- Experience in developing and tuning SIEM and EDR use cases, correlation rules, and alerts
- Strong understanding of network protocols, system logs, and security event correlation
- Experience working with incident response teams for triaging and analysis.
Preferred Qualifications:
Experience using
Microsoft Sentinel Preferred Certifications:
- GIAC Continuous Monitoring Certification (GMON)
- GIAC Certified Incident Handler (GCIH)
- GIAC Certified Forensic Analyst (GCFA)
- GIAC Certified Intrusion Analyst (GCIA)
- GIAC Network Forensic Analyst (GNFA)
- GIAC Cloud Threat Detection (GCTD) GIAC Cloud Forensics Responder (GCFR)
Security Clearance Requirements:
Must possess active Top Secret security clearance with SCI eligibility #M2
Ref:
#850-Rockville (ALTA IT)