Mediabistro logo
job logo

Splunk Engineer

General Dynamics Information Technology, Tampa, FL, United States


Job Qualifications
Bash (Programming Language), Python Software Development, SIEM Tools, Splunk Administration.

Job Description
Advance how our customers operate while you advance your career. Join GDIT as a

Splunk Engineer

and build an impactful career in enterprise IT, collaborating with people who are driven and resourceful like you.

Duties and Responsibilities

Design, implement, and maintain Splunk Enterprise infrastructure, including deployment, configuration, and performance tuning.

Collect, index, and monitor machine data across a large‑scale environment, ensuring high availability and security.

Develop and configure Splunk dashboards, alerts, and reports to support operational, security, and performance monitoring.

Develop and optimize SPL (Search Processing Language) queries to analyze logs and provide valuable insights.

Collaborate with security and operations teams to create use cases, improve data ingestion, and enhance event correlation.

Troubleshoot and resolve performance, security, and scalability issues within Splunk environments.

Integrate third‑party systems and data sources with Splunk to enhance the visibility of network traffic and security incidents.

Provide technical support and training to junior administrators and other staff members to optimize the usage of Splunk.

Monitor and report on the health of Splunk infrastructure, ensuring it is operating within defined SLAs.

Perform regular updates and maintenance on Splunk instances, including upgrading to the latest releases.

Provide incident response analysis and participate in the development of security‑related queries and monitoring rules.

Document processes, configurations, and best practices for future reference.

What You’ll Need to Succeed
Certification: DoD 8140 or DoD 8570 Certification.

Experience: 10+ years of related experience.

Required Skills

Proven experience in Splunk configuration, administration, and optimization.

Strong understanding of data ingestion, search queries, indexing, and reporting in Splunk.

Proficiency in Splunk SPL for querying and analyzing machine data.

Experience in setting up and managing Splunk enterprise‑wide alerts, reports, and dashboards.

Knowledge of security monitoring, SIEM integration, and log management best practices.

Ability to analyze and troubleshoot Splunk performance issues and security incidents.

Familiarity with scripting languages (e.g., Python, Bash) for automating Splunk‑related tasks.

Desired Skills

Splunk Certified Power User or Splunk Certified Admin.

ITIL 4 Foundation Certification.

Experience working with large‑scale environments (5,000+ users, 1,000+ servers).

Familiarity with SIEM, PKI, or other security‑related technologies.

Experience with cloud‑based Splunk implementations (e.g., Splunk Cloud).

Prior experience working in cross‑functional IT teams and supporting security operations.

Required Security clearance: current/active TS/SCI clearance.

US citizenship required.

Compensation
Likely salary range: $148,750 – $201,250.

Work Conditions

Schedule: 40 hours per week.

Travel: Less than 10%.

Telecommuting: Onsite.

Location
USA, FL – MacDill AFB.

Benefits
Comprehensive benefits and wellness packages, 401K with company match, competitive pay and paid time off.

Equal Opportunity Employer
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans.

#J-18808-Ljbffr