Enable America Jobs

Enable America Logo

Job Information

System One Splunk Data Analytic Subject Matter Expert in Woodlawn, Maryland

Splunk Data Analytic Subject Matter Expert

ALTA IT Services is seeking a Splunk Data Analytic Subject Matter Expert to join our team of qualified, diverse individuals. This position will be located in Woodlawn, MD.

This Splunk Data Analytic Subject Matter Expert (SME) will provide optimization of data flow using aggregation, filters, etc. The Splunk Data Analytic SME will be involved in the analysis of unstructured and semi-structured data, including latent semantic indexing (LSI), entity identification and tagging, complex event processing (CEP), and the application of analysis algorithms on distributed, clustered, and cloud-based high-performance infrastructures. The Subject Matter Expert will exercise creativity in applying non-traditional approaches to large-scale analysis of unstructured data in support of high-value use cases visualized through multi-dimensional interfaces. Handles processing and index requests against high-volume collections of data and high-velocity data streams. The candidate must have the ability to make discoveries in the world of big data. Requires strong technical and computational skills - engineering, physics, mathematics, coupled with the ability to code design, develop, and deploy sophisticated applications using advanced unstructured and semi-structured data analysis techniques and utilizing high-performance computing environments.

The Splunk Data Analytic Subject Matter Expert must have the ability to utilize advance tools and analytical skills to interpret, connect, predict, and make discoveries in complex data and deliver recommendations for business and analytic decisions. Experience with cyber security application development, cyber security data collection tools, cyber security information and event management (SIEM) technology supports threat detection, compliance, and security incident management tools. Through the collection and analysis (both near real time and historical) of security events, as well as a wide variety of other event and contextual data sources. The Splunk Data Analytic Subject Matter Expert should be proficient with recognizing and onboarding new data sources into Splunk, Splunk Data Pipelines, analyzing the data for anomalies and trends, and building dashboards highlighting the key trends of the data. The Splunk engineer should be proficient within a Linux environment, editing and maintaining Splunk configuration files and apps.

Duties and Responsibilities:

  • Create a consolidated data set that conforms to the common information model made up of sensor data sources that is already aggregated together and is also already searchable.

  • Develop the capability to aggregate all sensor data results based on two main categories: “tangible assets, namely hardware, software, and data” and “Information Systems, groups of assets with a business purpose.”

  • Develop the capability to tag new data so that it falls into the Re-Usable data assets model so that IO and CDM dashboard can ingest them.

  • Create a way to translate key value pairs from any sensor tools into the format needed to be consumed.

  • Transform already good data into the format needed for ingestion by Xacta.IO and CDM Elastic file.

  • Create data pipeline and create connections between data source(s) and the Re-Usable data asset model.

  • Create connection between Splunk and the Re-Usable data asset model.

  • Establish Xacta.IO data pipeline connection with the Re-Usable data asset model.

  • Establish CDM Elastic data pipeline connection with the Re-Usable data asset model.

  • Develop an integrator between Splunk and Xacta.IO and CDM Elastic.

  • Buildout Data Warehouses/ data models:

  • Tag Data

  • Buildout data pipelines in Splunk

  • Establish data pipeline connections

  • Develop Integrators/Integrations (between Splunk, DbConnect, Splunk, Xacta)

  • Aggregate various types of data

  • Create Key Value pairs

  • ETL coding

  • Buildout Dashboards

  • Configure notable event actions, action menus and Adaptive Responses.

  • Data onboarding and data ingestion normalization recommendations.

  • Strong knowledge of security risk procedures, security patterns, authentication technologies and security attack pathologies.

  • Develop, evaluate, and document, specific metrics for management purposes.

  • Create Dashboards to monitor the traffic volumes, response times, errors, and warnings across various data centers.

  • Monitor the web portals, log files and databases.

  • Design and Develop Splunk for routine use.

  • Solve complex Integration challenges and debug complex configuration issues.

  • Consult with stakeholders to establish, maintain and refresh their strategic direction in cloud adoption.

    Basic Qualifications:

  • Minimum knowledge, skills, abilities needed.

  • Bachelor’s degree and 7 years of experience, Master's degree and 5 years of experience, or 11 years of experience in lieu of a degree

  • At least 4 years’ experience using customer-focused Splunk Data Pipelining SIEM engineering background

  • At least 4 years’ experience in a senior Splunk role working in a Splunk clustered environment supporting SOC or NOC environments

  • At least 4 years of experience with:

  • In-depth knowledge of designing, upgrading, maintaining, and implementing network devices on a large-scale enterprise

  • Direct experience with Splunk Engineering and data integration

  • Prior SIEM data modelling experience on similar platform at scale (>50 servers)

  • Scripting and development skills in Python/Perl with deep comprehension of regular expressions

  • Coordination and communication with other remotely deployed team members

  • Developing documentation with processes and procedures

  • Proposing, implementing automation features in a large enterprise environment

  • At least 3 years of experience with Linux and SQL/ODBC interfaces

  • At least 2 years of experience with data transport and transformation APIs and technologies such as JSON, XML, XSLT, JDBC, SOAP and REST.

  • Hold active Splunk Core Certifications of at least Splunk Architect

  • Minimum of 3 year of experience in developing and tailoring reporting from network security tools.

  • Must be able to obtain and maintain a US Public Trust clearance.

    Preferred Qualifications:

    Candidates with these skills will be given preferential consideration.

    • Experience with Splunk Common Information Model (CIM) and Enterprise Analytic.

    • Strong problem-solving abilities with an analytic and qualitative eye for reasoning under pressure.

    • Self-starter with the ability to independently prioritize and complete multiple tasks with little to no supervision.

    • Knowledge of Cloud Services such as AWS, Azure, Office365.

    • Ability to script in one more of the following computer languages Python, Bash, Visual Basic or Powershell.

System One, and its subsidiaries including Joulé, ALTA IT Services, CM Access, TPGS, and MOUNTAIN, LTD., are leaders in delivering workforce solutions and integrated services across North America. We help clients get work done more efficiently and economically, without compromising quality. System One not only serves as a valued partner for our clients, but we offer eligible full-time employees health and welfare benefits coverage options including medical, dental, vision, spending accounts, life insurance, voluntary plans, as well as participation in a 401(k) plan.

System One is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, age, national origin, disability, family care or medical leave status, genetic information, veteran status, marital status, or any other characteristic protected by applicable federal, state, or local law.

DirectEmployers