×
Register Here to Apply for Jobs or Post Jobs. X

Splunk Engineer

Job in Mission, Johnson County, Kansas, 66201, USA
Listing for: Fuseeng
Full Time position
Listed on 2026-02-15
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below

Description

The Splunk Engineer is responsible for the design, implementation, optimization, and sustainment of enterprise logging, monitoring, and security analytics solutions. This role ensures Splunk environments meet availability, performance, compliance, and audit requirements.

Key Responsibilities
  • Architect, deploy, and maintain enterprise Splunk environments, including indexers, search heads, forwarders, and multi-region architectures.
  • Design, develop, and sustain custom Splunk dashboards and analytics supporting:
    • Security events, audit data, and user activity monitoring (UAM)
    • STE/STN compliance, vulnerability and compliance scans
    • Network/system observable events by SSP
    • Containerized application events by namespace
    • Mission metrics, outage tracking, and system/network utilization
  • Ensure Splunk dashboards and logging infrastructure maintain =93% operational availability monthly.
  • Develop and maintain dashboards for authentication events, privileged access, account management, role escalation, and container security events.
  • Integrate data from Net Flow/sFlow, Syslog, Cribl, Nagios, HP NNMi, HPNA, vulnerability scanners, and compliance tools.
  • Perform Splunk scaling, performance tuning, data onboarding, and index management.
  • Maintain log retention policies ensuring:
    • 30 days online searchable logs
    • 5 years, 11 months offline retention with restore capability
  • Provide Tier-4 support, including vendor escalation and coordination with Splunk engineering.
  • Advise architects and security accreditors on Splunk security configurations and audit capabilities.
  • Develop automation, parsing, and enrichment logic to reduce false positives and enhance alert fidelity.
Requirements

TS/SCI w/ Polygraph Clearance Required

Required Skills
  • Splunk Enterprise architecture and administration
  • Security logging, SIEM design, and compliance reporting
  • Linux systems administration
  • Data onboarding (Syslog, Net Flow, API ingestion)
  • Scripting (Python, Bash, SPL)
#J-18808-Ljbffr
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary