Splunk Cyber Threat Analyst
Arlington, Virginia
100% Remote
Contract
$50/hr - $57/hr
Splunk Cyber Threat Analyst
The company is located in the D.C. Area and will remain 100% remote.
What You Will Be Doing:
This position doesn’t provide sponsorship.
The company is located in the D.C. Area and will remain 100% remote.
What You Will Be Doing:
- Develop and execute complex, advanced Splunk searches to retrieve, analyze, and visualize data.
- Optimize existing Splunk queries to enhance performance and efficiency.
- Analyze data from various log sources to identify trends, patterns, and anomalies.
- Provide actionable insights and recommendations based on data analysis and search results.
- Design, create, and maintain dashboards to visually represent key data points clearly.
- Configure, manage, and optimize Splunk alerts to notify stakeholders of critical events or anomalies, reduce false positives, and ensure timely detection of issues.
- Generate regular and ad-hoc reports using Splunk’s reporting features and basic visualizations, ensuring accuracy and alignment with business objectives.
- Customize Splunk visualizations (charts, graphs, tables) for clear, effective data representation.
- Maintain data integrity and consistency across all Splunk searches, dashboards, alerts, and reports, troubleshooting any discrepancies or issues promptly.
- Collaborate with IT, security, and business teams to understand data needs and provide tailored Splunk solutions.
- Document search queries, dashboards, alert configurations, and report specifications for future reference and knowledge sharing.
- 5 years of IT experience.
- Bachelor’s degree in Computer Science, Information Systems, Mathematics, Engineering, or a related field, or an additional two (2) years of experience.
- 2+ years of experience in Splunk administration, analysis, or engineering.
- Experience with data analysis, visualization best practices, and techniques in Splunk.
- Proven ability to interpret and analyze data from various log sources to identify trends, anomalies, and patterns.
- Splunk Core Certified Power User.
- Splunk Core Certified Advanced Power User, Splunk Enterprise Certified Admin, Sec+, CEH, CISSP, or similar certifications.
- Experience working in a Security Operations Center (SOC) or as an Incident Response Analyst.
- Proficiency in HTTP coding, JavaScript, and Python.
- Experience with correlation searches, advanced dashboards, and advanced Splunk visualizations.
This position doesn’t provide sponsorship.
You will receive the following benefits:
- Medical Insurance - Four medical plans to choose from for you and your family
- Dental & Orthodontia Benefits
- Vision Benefits
- Health Savings Account (HSA)
- Health and Dependent Care Flexible Spending Accounts
- Voluntary Life Insurance, Long-Term & Short-Term Disability Insurance
- Hospital Indemnity Insurance
- 401(k) including match with pre and post-tax options
- Paid Sick Time Leave
- Legal and Identity Protection Plans
- Pre-tax Commuter Benefit
- 529 College Saver Plan
Motion Recruitment Partners (MRP) is an Equal Opportunity Employer, including Veterans/Disability/Women. All applicants must be currently authorized to work on a full-time basis in the country for which they are applying, and no sponsorship is currently available. Employment is subject to the successful completion of a pre-employment screening. Accommodation will be provided in all parts of the hiring process as required under MRP’s Employment Accommodation policy. Applicants need to make their needs known in advance.