More jobs:
Sr. Manager, Splunk Engineering
Job in
Chicago, Cook County, Illinois, 60290, USA
Listed on 2026-02-09
Listing for:
Early Warning Services LLC
Full Time
position Listed on 2026-02-09
Job specializations:
-
IT/Tech
Cybersecurity, Systems Engineer
Job Description & How to Apply Below
Overview
At Early Warning, we've powered and protected the U.S. financial system for over thirty years with cutting-edge solutions like Zelle, Paze, and more. As a trusted name in payments, we partner with thousands of institutions to increase access to financial services and protect transactions for hundreds of millions of consumers and small businesses.
Positions located in Scottsdale, San Francisco, Chicago, or New York follow a hybrid work model to allow for a more collaborative working environment.
Candidates responding to this posting must independently possess the eligibility to work in the United States, for any employer, at the date of hire. This position is ineligible for employment Visa sponsorship.
Essential Functions- Mentors and manages the Splunk Engineering team and provides effective leadership to drive a highly engaged, high-performance team.
- Leads the risk and security organization staff to identify, document, architect and develop process efficiencies.
- Maintains an excellent understanding of standard roles, processes and tools utilized within an information security organization.
- Defines, leads, gathers, writes and formalizes process use-cases, functional, and non-functional requirements.
- Communicates and organizes stakeholders and customers within projects to build sustainable solutions with required capabilities.
- Leads, architects, and designs solutions based on project use cases and requirements.
- Leads both the strategic and tactical management of the Splunk Enterprise, Security & User Behavioral Analytic ecosystems, concentrating on data incorporation, system fine-tuning, capacity planning, security and system updates.
- Develops and manages effective monitoring, alerting, and reporting to uphold service level agreements and ensure visibility into system status, usage and security threats.
- Leads efforts to update platforms and apply patches, addressing vulnerabilities and adhering to supported standards.
- Collaborates with other information security departments to augment threat detection capabilities and bolster incident response actions.
- Leads incident management processes, including troubleshooting, resolving outages, and conducting breach investigations.
- Directly engages with end-users for requirements gathering, troubleshooting, and crafting Splunk queries, alerts, reports, and dashboards, ensuring hands-on involvement in technical tasks.
- Produces, updates, and verifies documentation accuracy and relevance for the logging environment.
- Works alongside auditors and fulfills regulatory standards, employing security tools to aid in compliance initiatives.
- Delivers metrics related to platform performance, capacity, and user management, involving direct analysis and refinement efforts.
- Ensures 24x7 operational readiness and swift incident response through participation in an on-call roster.
- Keeps abreast of the latest technologies, trends, and strategies in the field, applying best practices for logging and monitoring.
- Impacts the CSIRTS team to respond to threats by creating, tuning and testing high fidelity rules for the SIEM platform
- Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for detecting threats
- Supports the company's commitment to risk management and protecting the integrity and confidentiality of systems and data.
- The above job description is a summary of job responsibilities and is not intended to be an all-inclusive list of duties and standards of the position. Incumbents will follow instructions and perform tasks and other duties as assigned by their manager.
- Education and/or experience typically obtained through completion of a bachelor's degree in computer science, IT, Security, Engineering, or Math.
- Minimum 10 years of Splunk and/or information security technology experience.
- Demonstrated ability to lead, mentor, coach and guide
- Ability to work within a team environment and independently.
- Effective communication skills to speak and write for all technology experience levels.
- Effective interpersonal skills, able to comfortably present to peers, coworkers, and customers.
- Excellent experience in analyzing technical issues and making recommendations for corrective action.
- A propensity for continued development of skills through research and training.
- Expert in analyzing advanced technical issues and solving problems or making recommendations for corrective action.
- In-depth knowledge of SIEM components, data ingestion processes, and querying data.
- Demonstrated capability to steer projects, oversee daily tasks, and directly engage in technical duties.
- Exceptional problem-solving, organizational, and communication skills, with the ability to elucidate technical concepts to non-technical audiences.
- Expert knowledge of network monitoring and network exploitation techniques.
- Expert experience in responding to malicious threats coming from various sources.
- Experience managing…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×