
IT Security SIEM (Splunk) Engineer
3B Staffing LLC, New York, NY, United States
LinkedIn Must needed
Direct line phone no must needed
Local Only.
Splunk Engineer - - - Onsite New York, NY 10038 -
Employment Type: W2
U.S. Citizenship Status: U.S. Citizen; Green Card
This one appears to be hair on fire. Asking if we can provide resumes today.
Anticipated Dates of Performance:
8/4/2025 - 7/31/2026
Hours / Shift:
Normal Business Days/Hours: Monday - Friday (9:00am - 5:00pm includes one-hour unpaid lunch) - 35 hours work week.
Location where services will be provided:
110 William Street, New York, NY 10038
Scope of Work
The IT Security SIEM (Splunk) Engineer will provide overall engineering, and administration in supporting a cloud based Splunk environment consisting of search heads, indexes, deployers, deployment servers, heavy/universal forwarders and Splunk apps spanning security, performance, and operational roles. The Engineer should be proficient with recognizing and onboarding new data sources into Splunk, analyzing the data for anomalies and trends, and building dashboards highlighting the key trends of the data. The IT Security SIEM (Splunk) Engineer should be proficient within Linux environment, edition and the following:
• Good understanding and hands on experience of designing business solutions using Splunk
• Ability to Design, develop, and maintain complex Splunk queries and dashboards intended for technical and executive audiences
• High level experience with dashboards, reports, alerts and managing knowledge objects
• Knowledge of enterprise logging, including application, web, database, and security logging
• Strong interpersonal, communication, and presentation skills
• Advanced experience with Splunk data analytics, data visualization, reporting capabilities
• Ability to work self-sufficiently on assigned tasks
• Responsible for identifying and onboarding of log sources to help with monitoring, detection, and response
• Work with stakeholders to develop requirements and deliverables
Qualifications and Desired Skills:
• Knowledge of Incident Response Procedures
• Knowledge of Packet Analysis
• Knowledge of IDS/IPS solutions and various Host-Based Tools
• Experience with Log Aggregation Tools
• Knowledge of patterns in network and system activity via log correlation using Splunk and supplemental tools
• Verbal and written communication ability
• Splunk Certified to include but not limited to Splunk Enterprise Certified Admin, Splunk Cloud Certified Admin, Splunk Enterprise Certified Architect
• CASP, GCIH, GCWN, GISF, GISP, GSSP, GICSP, GSSP, SEI, CISSP, CSSLP, SSCP, CCNP, CCNP Security, CCIE Security, CEH, ECSP, MCSE
Direct line phone no must needed
Local Only.
Splunk Engineer - - - Onsite New York, NY 10038 -
Employment Type: W2
U.S. Citizenship Status: U.S. Citizen; Green Card
This one appears to be hair on fire. Asking if we can provide resumes today.
Anticipated Dates of Performance:
8/4/2025 - 7/31/2026
Hours / Shift:
Normal Business Days/Hours: Monday - Friday (9:00am - 5:00pm includes one-hour unpaid lunch) - 35 hours work week.
Location where services will be provided:
110 William Street, New York, NY 10038
Scope of Work
The IT Security SIEM (Splunk) Engineer will provide overall engineering, and administration in supporting a cloud based Splunk environment consisting of search heads, indexes, deployers, deployment servers, heavy/universal forwarders and Splunk apps spanning security, performance, and operational roles. The Engineer should be proficient with recognizing and onboarding new data sources into Splunk, analyzing the data for anomalies and trends, and building dashboards highlighting the key trends of the data. The IT Security SIEM (Splunk) Engineer should be proficient within Linux environment, edition and the following:
• Good understanding and hands on experience of designing business solutions using Splunk
• Ability to Design, develop, and maintain complex Splunk queries and dashboards intended for technical and executive audiences
• High level experience with dashboards, reports, alerts and managing knowledge objects
• Knowledge of enterprise logging, including application, web, database, and security logging
• Strong interpersonal, communication, and presentation skills
• Advanced experience with Splunk data analytics, data visualization, reporting capabilities
• Ability to work self-sufficiently on assigned tasks
• Responsible for identifying and onboarding of log sources to help with monitoring, detection, and response
• Work with stakeholders to develop requirements and deliverables
Qualifications and Desired Skills:
• Knowledge of Incident Response Procedures
• Knowledge of Packet Analysis
• Knowledge of IDS/IPS solutions and various Host-Based Tools
• Experience with Log Aggregation Tools
• Knowledge of patterns in network and system activity via log correlation using Splunk and supplemental tools
• Verbal and written communication ability
• Splunk Certified to include but not limited to Splunk Enterprise Certified Admin, Splunk Cloud Certified Admin, Splunk Enterprise Certified Architect
• CASP, GCIH, GCWN, GISF, GISP, GSSP, GICSP, GSSP, SEI, CISSP, CSSLP, SSCP, CCNP, CCNP Security, CCIE Security, CEH, ECSP, MCSE