One Network Enterprises
SIEM Engineer / Splunk Certified Administrator - Mid and Senior Levels ID 163337
One Network Enterprises, Baltimore, Maryland, United States,
Prodigy One, LLC. is a software engineering and consulting firm providing more than 45 years of service to state and federal customers. By combining unparalleled experience and capabilities, our company provides big data, cloud development, and enterprise management solutions. We are focused on product usability and end user presentation to help our customers make the best decisions possible. Given our length of service in the industry, Prodigy One knows the importance of a competitive salary and benefits package. That's why our total compensation package can be tailored to meet employees personal needs.
A CLEARANCE IS REQUIRED TO BE CONSIDERED FOR THIS ROLEClearance required: Active TS/SCI clearance with Polygraph
Location: Annapolis Junction, MD
Salary Information
Level 1 - 7
yrs of experience + BS degree or additional 5yrs of experience128K-137KLevel 2 -
10 yrs of experience + BS degree or additional 5 years of experience159K-168K
SIEM (Security Information and Event Management) Engineer / Splunk Certified Administrator
Job Summary / Primary Responsibilities
The selected candidate will be responsible for configuring the collection, parsing, correlation, and visualization of events for a critical operational system. She/he will demonstrate strong skills in system administration, log management, event correlation, and threat detection and will support building and maintaining a system that analyzes collected data and derives facts, inferences, and projections to determine if the systems being monitored are operating normally. The individual will work on a team responsible for configuring the systems which support analysts and end‐users. The successful candidate will support the collection and extraction of data used to refine existing and new reports, analytics, and dashboards, and will be involved with the drafting and creation of reports and dashboards based on end‐user requirements. She/he will also support the integration of resources across teams to better define the audit data being collected to eliminate false positives and false negatives from the data.
Basic/Required QualificationsAt least 8 years of related experience.At least 2 years of experience with one or more of the following: StealthWatch, TripWire, Zenoss, ArcSight, Splunk.Experience in design, implementation, and support of Splunk core components, including: indexers, forwarders, search heads, and cluster managers.Experience with configuration and administration of Splunk ingestion and forwarding for new and existing applications and data.Experience with troubleshooting Splunk dataflow issues between the various Splunk core components.Experience configuring and deploying data collection for a variety of operating systems and networking platforms.Experience creating Dashboards and Analytics within SIEM tools.Experience working with monitoring systems supporting auditing, incident response, and system health.Understanding of networking components and devices, ports, protocols, and basic networking troubleshooting steps.The ability to troubleshoot issues with log feeds, search time, and field extractions.The ability to troubleshoot problems related to data solutions.
Preferred QualificationsBachelor's Degree in Computer Science, Engineering, Information Assurance, or a related discipline.Network Security Operations Center (SOC) experience.Experience and talent in data visualization.Experience creating workflows for Incident Response within a SIEM Tool.Security+ Certification.GIAC Certified Incident Handler Certification.GIAC Cyber Threat Intelligence Certification.Cybersecurity certifications.Formal SIEM training.Experience working on an Agile team/program.
Benefits:Healthcare for Employee and Spouse and/or Children that is fully funded by Prodigy One10% Employer Contribution to 401K; Immediately Vested7 Weeks Paid Time Off (PTO)$2500 for Professional Development
Prodigy One, LLC provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training.
#J-18808-Ljbffr
A CLEARANCE IS REQUIRED TO BE CONSIDERED FOR THIS ROLEClearance required: Active TS/SCI clearance with Polygraph
Location: Annapolis Junction, MD
Salary Information
Level 1 - 7
yrs of experience + BS degree or additional 5yrs of experience128K-137KLevel 2 -
10 yrs of experience + BS degree or additional 5 years of experience159K-168K
SIEM (Security Information and Event Management) Engineer / Splunk Certified Administrator
Job Summary / Primary Responsibilities
The selected candidate will be responsible for configuring the collection, parsing, correlation, and visualization of events for a critical operational system. She/he will demonstrate strong skills in system administration, log management, event correlation, and threat detection and will support building and maintaining a system that analyzes collected data and derives facts, inferences, and projections to determine if the systems being monitored are operating normally. The individual will work on a team responsible for configuring the systems which support analysts and end‐users. The successful candidate will support the collection and extraction of data used to refine existing and new reports, analytics, and dashboards, and will be involved with the drafting and creation of reports and dashboards based on end‐user requirements. She/he will also support the integration of resources across teams to better define the audit data being collected to eliminate false positives and false negatives from the data.
Basic/Required QualificationsAt least 8 years of related experience.At least 2 years of experience with one or more of the following: StealthWatch, TripWire, Zenoss, ArcSight, Splunk.Experience in design, implementation, and support of Splunk core components, including: indexers, forwarders, search heads, and cluster managers.Experience with configuration and administration of Splunk ingestion and forwarding for new and existing applications and data.Experience with troubleshooting Splunk dataflow issues between the various Splunk core components.Experience configuring and deploying data collection for a variety of operating systems and networking platforms.Experience creating Dashboards and Analytics within SIEM tools.Experience working with monitoring systems supporting auditing, incident response, and system health.Understanding of networking components and devices, ports, protocols, and basic networking troubleshooting steps.The ability to troubleshoot issues with log feeds, search time, and field extractions.The ability to troubleshoot problems related to data solutions.
Preferred QualificationsBachelor's Degree in Computer Science, Engineering, Information Assurance, or a related discipline.Network Security Operations Center (SOC) experience.Experience and talent in data visualization.Experience creating workflows for Incident Response within a SIEM Tool.Security+ Certification.GIAC Certified Incident Handler Certification.GIAC Cyber Threat Intelligence Certification.Cybersecurity certifications.Formal SIEM training.Experience working on an Agile team/program.
Benefits:Healthcare for Employee and Spouse and/or Children that is fully funded by Prodigy One10% Employer Contribution to 401K; Immediately Vested7 Weeks Paid Time Off (PTO)$2500 for Professional Development
Prodigy One, LLC provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training.
#J-18808-Ljbffr