Splunk Engineer

Key Responsibilities:

  • Develop Splunk applications for continuous monitoring, reporting, and analytics.
  • Onboard and parse log data from servers, applications, and cloud sources
  • Develop and implement automation playbooks using SOAR platforms (e.g., Splunk SOAR, Cortex XSOAR, etc).
  • Identify repetitive SOC workflows and convert them into automated processes using Python and APIs.
  • Work closely with SOC analysts and SOAR developers to optimize alert handling, containment, and remediation processes.
  • Test, troubleshoot, and refine automation playbooks to improve effectiveness and reduce false positives.
  • Collaborate with security engineers to refine detection rules, enhance alerting logic, and improve security visibility.
  • Write and optimize SPL (Search Processing Language) queries
  • Support system monitoring and incident response using Splunk
  • Maintain performance and data accuracy in the Splunk environment

 

Qualifications Required:

  • Strong knowledge of SIEM (Splunk)
  • 5+ years of experience in cybersecurity or network security engineering roles
  • Experience with log ingestion, correlation rule development, alert tuning, or CIM mapping in Splunk
  • Experience creating dashboards and reports in Splunk
  • Experience creating and deploying playbooks or automated workflows.
  • Experience with REST APIs and integrations with security tools (e.g., EDRs, SIEMs, threat intel, AD, firewalls).
  • Experience performing threat detection and log analysis
  • Understanding of security operations and incident response procedures.
  • Proficiency in Python or scripting languages for security automation and API integrations.
  • Experience with security frameworks (e.g. MITRE ATT&CK, CIS, NIST, and ISO 27001).
  • Experience working with ServiceNow, Jira, or other ITSM platforms.