|                                             
 Title: Splunk Architect  Location: Fort Meade, MD or San Antonio, TX  US Citizenship: Required  Clearance: TS/SCI w/CI polygraph Responsibilities: 
 
  
 - Lead purple-team campaigns using ATT&CK-aligned threat scenarios relevant to Enterprise Core service components
 - Develop custom scripts that support automation for data pipeline health and status, data ingest, and/or support services that must be monitored and optimized
 - Identify and understand the techniques used by advanced threat actors, including zero-day vulnerabilities, exploit development, and advanced persistent threats (APTs)
 - Collaborate with the SOC team to develop and implement countermeasures, such as antivirus signatures, intrusion detection system (IDS) rules, and mitigation strategies
 - Provide expert guidance and advice to other SOC team members, assisting with incident response and malware analysis efforts
 - Own the end-to-end SIEM strategy and Splunk platform roadmap aligned to business risk and MITRE ATT&CK
 - Develop and deliver training materials to enhance the skills and knowledge of the SOC team in the field of malware reverse engineering.
 - Maintain up-to-date knowledge of the latest malware threats, vulnerabilities, and indust1y trends, sharing relevant information with the SOC team
 - Serve as Tier-3 escalation for major incidents, craft investigation SPL queries and timeline reconstruction
 - Design, deploy, and maintain Splunk Enterprise/Cloud architectures (indexer & search head clustering, cluster master/manager, deployer, DS/CM, MC)
 
  
 
 
 
Requirements:  
 
  
 - Bachelor's degree in IT, cybersecurity, or related technical field (an additional 4 years of relevant work may be substituted for a degree)
 - Minimum of seven (7) years of experience in security engineering/operations, including at least three (3) years architecting and administering Splunk Enterprise or Splunk Cloud at scale (multi-TB/day or multi-site)
 - Hands-on purple teaming experience, including two (2) years of planning/executing ATT&CK-aligned adversary emulation with measurable detection outcomes
 - Proficiency in programming languages or scripting languages like C, C++, Python, Bash, and PowerShell
 - Strong understanding of operating systems, networking protocols, and software exploitation techniques
 - Familiarity with various threat intelligence platforms, such as MITRE ATT&CK and the Cyber Kill Chain
 - Excellent written and verbal communication skills, with the ability to present complex information in a clear and concise manner
 - One of the following (or equivalent) demonstrating Splunk proficiency: Splunk Core Certified Power User or Splunk Enterprise Administrator
 - Security certification signaling detection/operations skill such as GCDA, GCIA, GMON, GXPN or OSCP
 - Experience with monitoring threats through Tools, Techniques, and Procedures and how they relate to the MITRE ATT&CK framework
 - Ability to train and mentor staff and bring awareness to current and emerging threats
 - TS/SCI clearance with a CI polygraph 
 
  
 
 
 
Equal Opportunity Employer/Veterans/Disabled 
  |