×
Register Here to Apply for Jobs or Post Jobs. X

Splunk Engineer; Intermediate

Job in Riverdale Park, Prince George's County, Maryland, USA
Listing for: Government Tactical Solutions, LLC
Full Time position
Listed on 2026-01-12
Job specializations:
  • IT/Tech
    Cybersecurity, IT Support
Salary/Wage Range or Industry Benchmark: 177000 - 212000 USD Yearly USD 177000.00 212000.00 YEAR
Job Description & How to Apply Below
Position: Splunk Engineer (Intermediate)

Splunk Engineer (Intermediate) – Government Tactical Solutions, LLC

Security Clearance: Active TS/SCI Clearance w/CI Polygraph

Location: Riverdale, MD

Job Type: Full‑Time

Target Salary Range: $177,000 – $212,000.
This represents the potential salary range for this position depending on education level, years of experience and/or certifications in addition to other position specific requirements which may impact salary.

Position Overview

The Splunk Engineer supports enterprise‑wide monitoring, alerting, and analytics across the customer’s operational and security environments. This position develops and maintains custom Splunk dashboards, visualizations, and alerts that provide actionable insights for NOC and SOC personnel. The engineer ensures data integrity, visibility, and system performance across mission‑critical networks and applications supporting government operations. This role bridges IT operations and cybersecurity by delivering analytics solutions that enhance situational awareness, reduce incident response time, and support compliance with NIST 800‑171 and DoD 8570 requirements.

Key Responsibilities
  • Design, develop, and maintain custom Splunk dashboards, alerts, and reports to support both NOC and SOC operations.
  • Onboard new data sources including network appliances, servers, security tools, and applications using forwarders, APIs, and syslog integrations.
  • Implement data normalization using the Splunk Common Information Model (CIM) to support consistent reporting and event correlation.
  • Develop and optimize SPL queries, regex extractions, and macros for high‑performing searches and visualizations.
  • Configure and tune threshold‑based and adaptive alerts for system performance, security, and application availability.
  • Collaborate with NOC and SOC analysts to define KPIs and ensure accurate visibility into network health and security posture.
  • Support incident detection, triage, and root cause analysis using Splunk dashboards and search tools.
  • Monitor and maintain the health and performance of Splunk Enterprise / Splunk Cloud environments.
  • Integrate Splunk with automation/orchestration tools (e.g., Ansible, Service Now, SOAR platforms) for improved workflow efficiency.
  • Document data source onboarding, dashboard configuration, and analytic processes in accordance with program SOPs.
Qualifications Education
  • Bachelor’s degree in Computer Science, Information Systems, Cybersecurity, or related field; equivalent work experience may be substituted.
Experience
  • 3–5 years of hands‑on experience administering, configuring, and developing within Splunk Enterprise or Splunk Cloud environments.
Skills
  • Demonstrated experience designing and maintaining custom dashboards, reports, and alerting frameworks.
  • Strong proficiency in Splunk Search Processing Language (SPL), field extractions, and data model creation.
  • Familiarity with Linux and Windows server environments, network protocols (TCP/IP, SNMP, syslog), and application log ingestion.
  • Understanding of NOC/SOC workflows, event correlation, and log management best practices.
  • Experience troubleshooting data ingestion, indexing, and search performance issues.
  • Excellent communication, documentation, and collaboration skills.
Certifications
  • Active CompTIA Security+, CySA+, CASP+, CISSP, or equivalent DoD 8570 IAT Level II.
Preferred Qualifications
  • Current Splunk Core Certified Power User, Admin, or Architect certification.
  • Experience supporting federal or DoD environments and familiarity with RMF (Risk Management Framework).
  • Experience with Python scripting, REST APIs, or JSON/XML parsing for custom integrations.
  • Working knowledge of NIST 800‑53/171, and log retention / audit evidence requirements.
  • Experience with automation, orchestration, or SIEM/SOAR integration.
Key Competencies
  • Strong analytical and problem‑solving skills.
  • Ability to work under pressure in mission‑critical environments.
  • Detail‑oriented with strong organizational skills.
  • Self‑motivated, adaptable, and able to operate effectively in a team or independently.
  • Commitment to continuous improvement and innovation in monitoring and analytics capabilities.
Tools & Technologies

Splunk Enterprise / Cloud, Linux, Windows Server, Cisco and Palo Alto devices, AWS/Azure cloud services, Ansible, Service Now, Python, JSON, REST APIs, Syslog, SNMP, SOAR, Git Lab CI/CD.

Seniority level

Mid‑Senior level

Employment type

Full‑time

Job function

Engineering and Information Technology

Industries

IT Services and IT Consulting

#J-18808-Ljbffr
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary