Celebrating our 30th year as a successful Small Business, Development InfoStructure LLC., (DEVIS) provides exceptional DevSecOps integration in our agile software development and embedded software solutions, combined with comprehensive IT management and consulting services to our federal, state, and local governments. The outcomes of our research and development, products and universe of services will support the international development community, multiple civilian agencies and the nation’s defense and intelligence communities. Our focused research, services and products include complex DevSecOps solutions to support refugee processing across multiple federal agencies, research and development for Signal Intelligence (SIGINT), Command, Control, Communications, Computers and Intelligence (C4I), Data Analytics, and Intelligence, Surveillance and Reconnaissance (ISR) development and sensor capabilities supporting both the aerospace/defense and intelligence communities, as well as complex HHS comprehensive care coding requirements, and integrated management systems for our countries civilian agencies (FAA, FDIC, HOR, etc.).
Our primary mission is to best serve the needs of our clients by solutioning with our stakeholder teams to ensure that the goals and objectives of our customers are proactively solutioned, such that opportunities to invest our time in developing long-term solutions and assets are abundant and move our clients forward efficiently.
At DEVIS, we are enthusiastic about our research, our work and embracing an environment where all are supported in the mission, while maintaining a healthy work-life balance.
Overview
In this role, you will design, implement, deploy, and manage complex Splunk environments for a highly complex Department of State organization. You will customize Splunk to meet specific use cases and requirements. You will develop and maintain Splunk dashboards and create reports tailored to the needs of different teams and stakeholders. You will be in charge of monitoring indexing performance, search performance, and data ingest. You will have to be proactive in identifying and resolving Splunk system and performance issues. You will analyze and conduct research to determine a cyber criminal’s capabilities, intentions, and attack approaches, including those with multiple phases. In addition, you will be responsible for supporting the remediation of any discovered threats and providing incident response capabilities when necessary.
This role will require you to stay up to date with the latest Splunk features, enhancements, and industry trends and manage relationships with Splunk vendors to stay informed about new products and offerings.
Responsibilities
Create, manage, and support automation solutions for Splunk orchestration.
Use the SIEM, EDR, IDS, and other tools to conduct cyber threat hunts.
Rapidly respond to incidents to minimize risk exposure and ensure system availability; proactively monitor internal and external-facing environments.
Identify attacker tools, tactics, and procedures to develop indicators of compromise.
Form and articulate expert opinions based on findings and analysis.
Seek opportunities to automate detection and remediation and reduce response times for incidents.
Provide incident response support and coordination, including investigating security incidents and coordinating with other teams to contain and remediate the incident.
Leverage Splunk to create advanced search queries and reports to monitor system performance, security threats, and operational metrics.
Collaborate and support inquiries from cross-functional internal and external stakeholders such as system administrators, compliance, and data engineering teams, to ensure documentation is complete and in compliance with information security policies.
Manage and support the development of security operations playbooks to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats.
Evaluate third-party products and services to verify they meet security and compliance requirements.
Familiarity with log management, event correlation, and data analysis concepts.
Drive improvements in technical architecture, standards, and processes to meet company objectives and best security practices.
Develops technical solutions to verify compliance with required technical controls autonomously.
Present findings/reports to stakeholders on a weekly basis.
Perform log analyses, parsing, indexing, and analyzing machine data logs to extract actionable insights.
Perform upgrades and patch management to keep Splunk environments up-to-date and secure.
Design intuitive and customizable dashboards to visualize data trends.
Desired Skills:
Experience in building Splunk Technology Add-ons and configuring field extractions for various data sources.
Strong experience working with Splunk, including architecting and implementing Splunk solutions in large-scale environments.
Proficiency in SPL (Search Processing Language) for creating complex queries, reports, and dashboards in Splunk.
Experience in designing, developing, testing, troubleshooting, deploying, and maintaining Splunk solutions, reporting, alerting, and dashboards.
Extensive knowledge of a tier Splunk installation: indexers, forwarders, search heads, and clusters.
Experience analyzing system, network, and application logs for attack techniques at all stages of the cyber kill chain.
Experience with more than one or more enterprise-scale EDR and SIEM tool.
Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways.
Strong analytical and critical thinking skills to identify and address complex data and system issues.
Strong problem-solving skills to investigate and resolve Splunk platform and data ingestion issues.
Strong communicator and collaborator, able to work closely with cross-functional teams.
Knowledgeable in using scripting languages (e.g., Python) and Splunk’s built-in scripting to automate routine tasks.
Detail-oriented with a strong commitment to documenting configurations, processes, and best practices.
Familiarity with ServiceNow cloud offering and log ingestion to Splunk.
Experience with Puppet, Ansible, or other configuration management tools.
Required Qualifications
Master’s Degree with 5 to 7 years of experience; Equivalent combination of education, technical training and certification (CISSP, C|EH, GIAC GREM, GCTI, GCFR, GCFA, Splunk Certified Cybersecurity Defense Analyst, Splunk Enterprise Security Certified Admin) and/or work experience; knowledgeable about configuring Splunk for security and compliance requirements, including FISMA, SOC 2, HIPAA, and GDPR. Active Secret Security Clearance.
Additional Perks/Benefits
Competitive salary compensation
401k Retirement Contribution Savings Plan
Devis is an AA/EOE/M/F/Disabled/VET Employer committed to providing equal employment opportunity without regard to an individual’s race, color, religion, age, gender, sexual orientation, veteran status, national origin or disability.
Powered by JazzHR
Customer Service Representative Serves as a liaison between the company and its customers.Shop operations responsibilities include documenting, overseeing and coordinating...
Apply For This JobOverview Healthcare Services Group (HCSG) services thousands of accounts nationwide and is now hiring a Manager in Training in your...
Apply For This Jobbr{display:none;}.css-58vpdc ul > li{margin-left:0;}.css-58vpdc li{padding:0;}]]> Job Description Job Description Performs a variety of clerical duties for the efficient functioning of...
Apply For This JobA consultant at Ferrilli works in partnership with clients, working through the Service Delivery Lifecycle, to engineer solutions for new...
Apply For This JobPosition Overview: Collects and enters patient data, generating birth and fetal death certificates, assisting patients in obtaining copies of vital...
Apply For This JobAcoustic is an independent marketing cloud with the open platform that serves an international client base of more than 3,500...
Apply For This Job