
Splunk Cyber Security Engineer (Top Secret clearance)
Cyber Security Engineer (Splunk)
Senior and SME level positions available
Top Secret Clearance is required
Huntsville, AL
ALTA IT Service is seeking a highly skilled and knowledgeable CyberSecurity Engineer Senior Level to support a 24x7x365 Watch Floor team and safeguard the confidentiality, integrity, and availability of an organization's information assets. This position is located on a customer site in Huntsville, AL or Clarksburg WV.
Responsibilities include but are not limited to:
Develop, upgrade, and enhance the enterprise Security Information and Event Monitoring (SIEM) strategy and tool implementation via Splunk, design data flow diagrams and alert feed architectures to ensure seamless alert integration
Develop and maintain SIEM architecture, including data sources, log management, and alerting mechanisms
Configure tools, settings, alerts, and notifications to improve the enterprise security and resilience capabilities, including implementation of Security Orchestration and Automation for Response (SOAR) and Endpoint Detection and Response (EDR) capabilities.
Develop content for rule implementation on network border devices (firewalls, routers, switches, IDS/IPS, Taclanes, etc.)
Monitor security events and alerts, conducting detailed analysis to identify potential security incidents
Participates in response activities to all major enterprise outages. Provide technical guidance and support to junior analysts and other team members. Stay current with the latest SIEM technologies, cyber threats, and best practices
Work and collaborate with incident response teams to investigate and remediate security incidents.
Minimum Qualifications:
Bachelor's degree, preferably in an IT-related or cybersecurity discipline.
Possess a minimum of 7 years IT related experience; preferably minimum of 3 years in cybersecurity.
Minimum 2 years of hands-on experience with Splunk.
Minimum of 1 years of hands-on experience with Crowdstrike EDR or Palto Alto XDR.
Experience in developing and tuning SIEM and EDR use cases, correlation rules, and alerts
Strong understanding of network protocols, system logs, and security event correlation
Experience working with incident response teams for triaging and analysis.
Preferred Qualifications:
Experience using Microsoft Sentinel
Preferred Certifications:
GIAC Continuous Monitoring Certification (GMON)
GIAC Certified Incident Handler (GCIH)
GIAC Certified Forensic Analyst (GCFA)
GIAC Certified Intrusion Analyst (GCIA)
GIAC Network Forensic Analyst (GNFA)
GIAC Cloud Threat Detection (GCTD)
GIAC Cloud Forensics Responder (GCFR)
Security Clearance Requirements:
Must possess active Top Secret security clearance with SCI eligibility
Cyber Security Engineer (Splunk)
Senior and SME level positions available
Top Secret Clearance is required
Huntsville, AL
ALTA IT Service is seeking a highly skilled and knowledgeable CyberSecurity Engineer Senior Level to support a 24x7x365 Watch Floor team and safeguard the confidentiality, integrity, and availability of an organization's information assets. This position is located on a customer site in Huntsville, AL or Clarksburg WV.
Responsibilities include but are not limited to:
Develop, upgrade, and enhance the enterprise Security Information and Event Monitoring (SIEM) strategy and tool implementation via Splunk, design data flow diagrams and alert feed architectures to ensure seamless alert integration
Develop and maintain SIEM architecture, including data sources, log management, and alerting mechanisms
Configure tools, settings, alerts, and notifications to improve the enterprise security and resilience capabilities, including implementation of Security Orchestration and Automation for Response (SOAR) and Endpoint Detection and Response (EDR) capabilities.
Develop content for rule implementation on network border devices (firewalls, routers, switches, IDS/IPS, Taclanes, etc.)
Monitor security events and alerts, conducting detailed analysis to identify potential security incidents
Participates in response activities to all major enterprise outages. Provide technical guidance and support to junior analysts and other team members. Stay current with the latest SIEM technologies, cyber threats, and best practices
Work and collaborate with incident response teams to investigate and remediate security incidents.
Minimum Qualifications:
Bachelor's degree, preferably in an IT-related or cybersecurity discipline.
Possess a minimum of 7 years IT related experience; preferably minimum of 3 years in cybersecurity.
Minimum 2 years of hands-on experience with Splunk.
Minimum of 1 years of hands-on experience with Crowdstrike EDR or Palto Alto XDR.
Experience in developing and tuning SIEM and EDR use cases, correlation rules, and alerts
Strong understanding of network protocols, system logs, and security event correlation
Experience working with incident response teams for triaging and analysis.
Preferred Qualifications:
Experience using Microsoft Sentinel
Preferred Certifications:
GIAC Continuous Monitoring Certification (GMON)
GIAC Certified Incident Handler (GCIH)
GIAC Certified Forensic Analyst (GCFA)
GIAC Certified Intrusion Analyst (GCIA)
GIAC Network Forensic Analyst (GNFA)
GIAC Cloud Threat Detection (GCTD)
GIAC Cloud Forensics Responder (GCFR)
Security Clearance Requirements:
Must possess active Top Secret security clearance with SCI eligibility