×
Register Here to Apply for Jobs or Post Jobs. X

Splunk Security Engineer Suitland, Maryland

Job in Suitland, Prince George's County, Maryland, 20746, USA
Listing for: G2it, Llc.
Full Time position
Listed on 2025-12-02
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager
Job Description & How to Apply Below
Position: Splunk Security Engineer New Suitland, Maryland, United States

Overview

As a Splunk Security Engineer with G2IT, you will play a critical role in strengthening cybersecurity operations through advanced automation, integrations, and data analysis. You’ll be responsible for building and maintaining Splunk SOAR playbooks, configuring Splunk Enterprise Security, and integrating with a wide range of DoD systems and security tools. This position is ideal for someone with deep Splunk expertise, strong problem-solving skills, and a passion for enabling mission-focused cybersecurity operations.

Responsibilities
  • Develop, maintain, and execute automated SOAR playbooks across multiple systems and devices.
  • Analyze log events, correlate data, and enhance threat detection and incident response workflows.
  • Design and manage integrations between Splunk SOAR and DoD security platforms (e.g., Trellix ePO, Tanium, Cisco, Palo Alto, Active Directory, Tenable.

    SC/Nessus, VMware, Service Now, Azure, AWS, Net App, Windows/Linux).
  • Configure and administer Splunk Enterprise Security (ES), ensuring CIM compliance, Risk-Based Alerting (RBA), ticketing, and SIEM integrations.
  • Apply and validate Enterprise Security Content Updates (ESCU).
  • Lead the automation lifecycle: concept, deployment, documentation, and tuning.
  • Build dashboards, reports, and response tools for security teams.
  • Ensure compliance, operational readiness, and proactive detection across cloud, endpoint, network, and email infrastructures.
  • Apply patches and upgrades to Splunk SOAR and its connectors.
  • Maintain and expand development/test environments (Windows/Linux) for playbook validation.
  • Fully test and document playbook execution, presenting solutions to stakeholders.
Required Qualifications
  • Active DoD TS/SCI clearance.
  • Bachelor’s degree with 8+ years of relevant experience, or Master’s with 6+ years (additional experience/certifications may substitute).
  • Current IAT Level II certification (e.g., Security+ CE) or ability to obtain within 30 days.
  • 5+ years of Splunk SOAR/Phantom experience (playbook development, troubleshooting, integrations).
  • Expertise in Splunk Administration, security event analysis, and Python automation.
  • Strong knowledge of cross-platform integrations and security tool APIs.
  • Proven success in process improvement within dynamic security environments.
Preferred Qualifications
  • Splunk Certified Enterprise Security Administrator.
  • Proficiency with DoD security/operational tools (Active Directory, DNS, firewalls, email, ACAS, Trellix/Tanium, Splunk, STIGs, Windows/Linux).
  • Strong technical writing skills for SOPs and documentation.
  • Completion of Splunk SOAR training courses.
  • Familiarity with MITRE ATT&CK and SOC triage workflows.
#J-18808-Ljbffr
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary