Summary:
Supports the DHS Enterprise Engineering Division, Enterprise Security Engineering within the Office of the Chief Information Officer (OCIO) is responsible for the architecture, design, engineering, Tier 3 operations support, maintenance, and management of the network and security infrastructure. This program portfolio includes management and oversight of the technical infrastructure and security tools, sensors, servers, and data storage devices to support the DHS Network Operations Security Center (NOSC) Cyber (SOC) and other DHS stakeholders and Components.
Duties/Responsibilities:
· Design, implement, and maintain the Splunk infrastructure, including Splunk Enterprise, cloud, and related components.
· Leverage in-depth knowledge and experience with Splunk in order to mentor other team members and actively assign tasks, tickets, and projects for completion.
· Lead, monitor, and report on engineering efforts and issue status and resolution with stakeholders and leadership.
· Collaborate with stakeholders to gather requirements and design solutions for data collection, indexing, and visualization within Splunk.
· Design and implement best practice optimization and configuration to maximize availability and performance through rigorous standards-based approach.
· Manage multiple assignments, changing priorities, and work independently with little oversight.
· Create and maintain documentation, including architecture diagrams, standard operating procedures, and best practices for Splunk usage.
· Monitor Splunk platform for proactive issue identification and resolution.
· Provide direct support for onboarding data into Splunk via forwarder, scripted inputs, TCP/UDP and modular inputs from sources such as FireEye, BlueCoat, Big IP, Cisco, Palo Alto, host syslogs, etc.
· Create, manage, and support automation solutions for Splunk deployment and orchestration within a Cloud environment.
· Lead senior engineers, other team members to work with application owners to solve technical problems at the network, system and application levels.
· Conduct periodic architectural reviews of installed sensors to assess effectiveness and propose optimal installation alternatives as required.
· Conduct network security architecture reviews to determine the size, and placement of intrusion monitoring equipment during the customer onboarding process.
· Documentation and reporting delivery along with presentation, teamwork and DHS wide collaboration are among the expected duties and mission of the task order.
· Build, implement and administer Splunk in Windows and Linux environments.
· Conceptualize, Design, Build, and Maintain current and future NOSC supported tools and platforms.
Minimum Qualifications / Requirements
· At least 5 years of technical and/or team leadership experience in a SOC, NOSC, or IT Service Management environment.
· At least 8 years of professional experience.
· Proficiency managing Splunk using the Splunk command-line interface.
· Expertise in Splunk orchestration and optimization leveraging standards-based approach.
· Proficiency managing Splunk using configuration files.
· Demonstratable experience with Cribl is a plus.
· Experience onboarding data into Splunk via forwarder, scripted inputs, TCP/UDP and modular inputs from a variety of sources.
· Proficiency onboarding data using Splunk developed add-ons for Windows, Linux, and common third-party devices and applications.
· Experience collaborating with separate engineering teams to configure data sources for Splunk integration.
· Experience in Linux, Windows and SQL/ODBC interfaces.
· Proficiency implementing and onboarding data in Splunk DB Connect.
· experience in app interface development, using REST API’s.
· Experience with Splunk performing systems administration, including performing installation, configuration, monitoring system performance and availability, upgrades, and troubleshooting.
· Experience developing in XML, Bash, JavaScript and Python, Perl, PowerShell scripts.
· General networking and security troubleshooting (firewalls, routing, NAT, etc.)
· Splunk architecture/design, implementation, and troubleshooting experience.
· Experience in managing, maintaining, and administering multi-site indexer cluster.
· Scripting and development skills (BASH, python, or java) with strong knowledge of regular expressions.
· Proficiency developing log ingestion and aggregation strategies per Splunk best practices.
· Proficiency normalizing data to Splunk Common Information Model (CIM).
· Experience implementing and optimizing Splunk data models.
· Expertise developing security-focused content for Splunk, including creation of complex threat detection log and operational dashboards.
· Perform integration activities to configure, connect, and pull data with 3rd party software APIs.
· Ability to autonomously prioritize and successfully deliver across a portfolio of projects.
· Undertakes day-to-day operational and user support.
· Must be willing to participate to a rotating on-call support (24/7/365) for nights, weekends, holiday issues.
Experience/Years of Relevant Experience:
Excellent verbal and written communication skills
Ability to meet deadlines and work independently.
Required Experience 5 years.
Education:
BA / BS in a Science, Technology, Engineering, Cybersecurity Management field
Certifications (Not Required):
CISSP (Certified Information Security Systems Professional)
CompTIA Security+
ITIL Foundations
Experience with Agile-based project management (primary Kanban)
Software/Hardware Experience Desired
Current Splunk Enterprise Certified Architect certification
Clearance:
Must be able to attain/maintain DHS EOD clearance.
Must be a US Citizen and pass a background check.
Maintain applicable security clearance(s) at the level required by the client and/or applicable certification(s) as Requested by Softek and/or required by Softek’s Client(s)/Customer(s).
Location:
Location: DHS HQ (TSA Springfield, VA), or Stennis Data Center
Telework Authorized, Remote Hybrid