Home

Looking for - SOC Analyst New Jersey, NJ(Onsite) at Remote, Remote, USA
Email: [email protected]
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=2145741&uid=

From:

Krishna Chaudhary,

Sibitalent

[email protected]

Reply to:   [email protected]

Hello,

I hope you are doing fine.

Please find the below Jd and let me know if you are interested.

Role:: SOC Analyst

Location:
New Jersey, NJ(Onsite)

Duration :: 12+ Month Contract

Job Description

The Splunk Level 3 Engineer will be responsible for ensuring the successful deployment, operation, optimization, and troubleshooting of Splunk environments. This role requires in-depth technical knowledge of Splunks advanced features, system architecture, integration with other tools, and performance tuning. As a senior technical expert, the Splunk Level 3 Engineer will provide leadership and mentoring to junior engineers and assist in problem resolution, root cause analysis, and driving continuous improvement of Splunk operations within the organization.

Key Responsibilities:

1.           Splunk System Administration:

o            Manage, configure, and support Splunk environments (indexers, search heads, forwarders, etc.).

o            Perform regular upgrades and patches to ensure systems are running on the latest versions of Splunk.

o            Monitor and ensure the health, performance, and scalability of Splunk deployments.

o            Troubleshoot complex Splunk issues, including indexing, search performance, and deployment problems.

2.           Log Data Integration & Parsing:

o            Develop and maintain Splunk inputs, data forwarding, and data parsing mechanisms.

o            Integrate a wide variety of data sources, including security devices, networking equipment, applications, and more.

o            Optimize event collection and processing for efficient indexing and search performance.

3.           Search Optimization & Query Performance:

o            Optimize Splunk queries (SPL - Search Processing Language) for speed and efficiency.

o            Troubleshoot slow or inefficient searches and recommend improvements to data models, indexing strategies, or search queries.

o            Design and implement advanced Splunk queries, alerts, and dashboards for security, performance monitoring, and operational intelligence.

4.           Splunk Security Monitoring:

o            Design, implement, and maintain security and compliance use cases using Splunk.

o            Integrate Splunk with security technologies (SIEM tools, firewalls, intrusion detection/prevention systems, etc.).

o            Perform advanced threat hunting, incident response, and security data analysis within Splunk.

5.           Technical Support and Troubleshooting:

o            Provide L3 technical support to internal teams and clients for complex issues, including performance problems, data indexing, and search issues.

o            Participate in root cause analysis and post-incident reviews for major Splunk-related incidents.

o            Provide on-call support for Splunk incidents as needed.

6.           Architecture & Best Practices:

o            Design and implement Splunk architectures that are scalable, highly available, and fault-tolerant.

o            Recommend and implement Splunk best practices for large-scale, enterprise-level deployments.

o            Collaborate with other teams (network, security, storage, cloud, etc.) for seamless integration and optimal Splunk operations.

7.           Documentation & Reporting:

o            Develop and maintain documentation related to Splunk deployment, configuration, and troubleshooting procedures.

o            Generate reports, dashboards, and alerts that provide visibility into system health, security posture, and performance metrics.

o            Prepare detailed technical reports for leadership and stakeholders.

8.           Mentorship & Collaboration:

o            Mentor junior-level Splunk engineers, sharing knowledge and helping with professional development.

o            Work closely with cross-functional teams (DevOps, Security, IT) to design and implement solutions using Splunk technology.

Participate in knowledge-sharing sessions and improve team performance through collaboration.

Required Skills & Qualifications:

            Experience:

o            5+ years of hands-on experience with Splunk administration, deployment, and troubleshooting in large, distributed environments.

o            In-depth knowledge of Splunk architecture (forwarders, indexers, search heads, cluster setup).

o            Proven experience integrating Splunk with various data sources (syslog, APIs, cloud services, etc.).

o            Strong experience with Splunk query language (SPL), data models, and dashboards.

            Technical Skills:

o            Proficiency in Splunk Enterprise and Splunk Cloud deployment, configuration, and maintenance.

o            Experience with Splunk deployment techniques, including forwarders, indexers, and clustered environments.

o            Strong understanding of security log management, SIEM, and security operations workflows.

o            Experience with systems administration, especially Linux/Unix-based environments.

o            Advanced troubleshooting and performance tuning in Splunk.

            Certifications (Preferred):

o            Splunk Certified Admin or Architect.

o            ITIL Foundations or equivalent IT service management certifications.

            Tools & Technologies:

o            Experience with additional log management and SIEM tools is a plus (e.g., ELK stack, Graylog, etc.).

o            Familiarity with cloud platforms (AWS, Azure) and cloud-native logging systems.

o            Scripting and automation skills (Python, Bash, Power, etc.).

Soft Skills:

            Strong analytical and problem-solving abilities.

            Excellent written and verbal communication skills.

            Ability to work in a team-oriented, collaborative environment.

            Ability to prioritize and manage multiple tasks and projects.

            Strong attention to detail and commitment to quality.

Additional Information:

            Some positions may require after-hours or weekend support depending on operational needs.

            Ability to adapt to a fast-paced environment and manage time effectively.

This job description can vary slightly depending on the company and specific needs, but the above points cover the typical responsibilities and qualifications for a Splunk Level 3 Engineer.

Thanks & Regards

Krishna Chaudhary

Sibitalent Corp.

101 E. Park Blvd., Suite 600, Plano, TX 75074

Direct No.: 219-258-9618

Phone: 972-502-9119

Email:[email protected]

URL: www.sibitalent.com

Keywords: information technology New Jersey Texas
Looking for - SOC Analyst New Jersey, NJ(Onsite)
[email protected]
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=2145741&uid=
[email protected]
View All
08:03 PM 05-Feb-25


To remove this job post send "job_kill 2145741" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]


Time Taken: 35

Location: , New Jersey