SHIFT TIME: Monday - Friday 0600-1430
We are seeking a skilled Mid-Level Splunk Administrator to support a mission-critical DISA (Defense Information Systems Agency) program. The selected candidate will play a key role in maintaining and enhancing the operational integrity of the Splunk platform, enabling real-time security monitoring, operational visibility, and advanced analytics. This role requires expertise in system administration, data onboarding, and Splunk search optimization, with an emphasis on DISA and DoD security compliance.
Manage and maintain Splunk infrastructure, including indexers, forwarders, search heads, and deployment servers.
Perform installation, configuration, and upgrading of Splunk Enterprise components in accordance with DISA guidelines.
Monitor Splunk system health, performance, and availability, ensuring optimal ingestion and query efficiency.
Administer role-based access controls (RBAC) and manage Splunk authentication integration (LDAP, CAC, PKI, etc.).
Develop and maintain data inputs, sourcetypes, field extractions, and parsing for accurate log ingestion from a variety of DISA-managed systems.
Work with log owners and data providers to ensure the reliable delivery of log data via forwarders or APIs.
Tune and optimize Splunk queries, dashboards, and reports for performance and clarity.
Ensure Splunk data ingestion, storage, and operations are compliant with DoD cybersecurity regulations, including DISA STIGs, RMF, and DoD auditing requirements.
Assist cybersecurity teams in real-time incident detection and response activities using Splunk data and dashboards.
Maintain data retention policies and support log management for audits and compliance checks.
Work closely with security, operations, and engineering teams to develop and deploy new Splunk use cases.
Provide user support and training to DISA stakeholders on Splunk search, dashboard development, and best practices.
Participate in change management, documentation updates, and knowledge sharing within the team.
3+ years of experience administering Splunk in an enterprise or DoD environment.
Proven experience with Splunk Enterprise administration, including search head clustering and indexer clustering.
Strong understanding of Splunk data models, CIM compliance, and field extractions (regex, Splunk props/transforms).
Experience onboarding data from security tools, network appliances, and infrastructure systems.
Familiarity with Linux/Unix systems administration and shell scripting.
Knowledge of DoD cybersecurity requirements (e.g., STIGs, RMF, NIST 800-53 controls).
Experience supporting tickets and change requests through ITSM platforms (e.g., Remedy, ServiceNow).
Excellent analytical, problem-solving, and communication skills.
Splunk Core Certified Power User or Splunk Certified Admin.
Experience with Splunk Enterprise Security (ES) or IT Service Intelligence (ITSI).
Familiarity with DISA-specific environments, Joint Regional Security Stacks (JRSS), or DoD cyber operations.
Experience with automation or orchestration tools (e.g., Ansible, Python, REST API integrations).
Understanding of Syslog, SNMP, JSON, XML, and other log transport/format standards.
Software Powered by iCIMS
www.icims.com