Splunk Data Analytics (SME)

Woodlawn, Maryland, United States

IT Concepts Inc.

ITC Home

View company page

Founded in 2003, IT Concepts’ core values – customer-centricity, teamwork, driven to deliver, innovation, and integrity – ensure we work together to be the best, realize objectives, and make a positive impact in our communities. We intentionally created and sustain our ITC culture that embraces change, experimentation, continuous learning, and improvement. We bring our design thinking problem-solving approach that challenges assumptions, prioritizes curiosity, and invites complexity to deliver innovative, efficient, and effective solutions. As we continue to grow in the support of our government customers, we are looking for driven and innovative individuals to join our team.

IT Concepts is seeking a Splunk Data Analyst (SME) who will support several projects at a federal agency. The position is located in Woodlawn, MD. The qualified candidate should have strong analytical, problem-solving, and communication skills with sharp attention to detail.

Description of Work:

  • Will provide optimization of data flow using aggregation, filters, etc.
  • Will be involved in the analysis of unstructured and semi-structured data, including latent semantic indexing (LSI), entity identification and tagging, complex event processing (CEP), and the application of analysis algorithms on distributed, clustered, and cloud-based high-performance infrastructures.
  • Will exercise creativity in applying non-traditional approaches to large-scale analysis of unstructured data in support of high-value use cases visualized through multi-dimensional interfaces.
  • Handles processing and index requests against high-volume collections of data and high-velocity data streams. Has the ability to make discoveries in the world of big data.

Requirements

  • Create a consolidated data set that conforms to the common information model made up of sensor data sources that is already aggregated together and is also already searchable.
  • Should be proficient with recognizing and onboarding new data sources into Splunk, Splunk Data Pipelines, analyzing the data for anomalies and trends, and building dashboards highlighting the key trends of the data.
  • Must have the ability to utilize advance tools and analytical skills to interpret, connect, predict, and make discoveries in complex data and deliver recommendations for business and analytic decisions.
  • Experience with cyber security application development, cyber security data collection tools, cyber security information and event management (SIEM) technology supports threat detection, compliance, and security incident management tools. 
  • Be proficient within a Linux environment, editing and maintaining Splunk configuration files and apps.  
  • Develop the capability to aggregate all sensor data results based on two main categories: “tangible assets, namely hardware, software, and data” and “Information Systems, groups of assets with a business purpose.”
  • Develop the capability to tag new data so that it falls into the Re-Usable data assets model so that IO and CDM dashboard can ingest them.
  • Create a way to translate key value pairs from any sensor tools into the format needed to be consumed.
  • Transform already good data into the format needed for ingestion by Xacta.IO and CDM Elastic file.
  • Create data pipeline and create connections between data source(s) and the Re-Usable data asset model.
  • Create connection between Splunk and the Re-Usable data asset model.
  • Establish Xacta.IO data pipeline connection with the Re-Usable data asset model.
  • Establish CDM Elastic data pipeline connection with the Re-Usable data asset model.
  • Develop an integrator between Splunk and Xacta.IO and CDM Elastic.
  • Buildout Data Warehouses/ data models
    • Tag Data
    • Buildout data pipelines in Splunk
    • Establish data pipeline connections
    • Develop Integrators/Integrations (between Splunk, DbConnect, Splunk, Xacta) 
    • Aggregate various types of data
    • Create Key Value pairs
    • ETL coding
    • Buildout Dashboards
  • Configure notable event actions, action menus and Adaptive Responses
  • Data onboarding and data ingestion normalization recommendations
  • Strong knowledge of security risk procedures, security patterns, authentication technologies and security attack pathologies
  • Develop, evaluate, and document, specific metrics for management purpose.
  • Create Dashboards to monitor the traffic volumes, response times, errors, and warnings across various data centers.
  • Monitor the web portals, log files and databases.
  • Design and Develop Splunk for routine use.
  • Solve complex Integration challenges and debug complex configuration issues.
  • Consult with stakeholders to establish, maintain, and refresh their strategic direction in cloud adoption.
  • Become knowledgeable on the CDM technical requirements for the federal government’s CDM program. Understand your role in CDM activities.
  • Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access.
  • Design, manage, and maintain enterprise SIEM infrastructure to improve data ingestion processes, including architectural work on data pipelines to ensure optimal flow of data.
  • Requires strong technical and computational skills - engineering, physics, mathematics, coupled with the ability to code design, develop, and deploy sophisticated applications using advanced unstructured and semi-structured data analysis techniques and utilizing high-performance computing environments.

Benefits

We offer great benefits – Competitive Paid Time Off, Medical, Dental and Vision Insurance, Identity Theft Protection, Legal Resources Coverage, 401(k) with company matching with NO vesting period.  ITC Health benefits have a $0 premium for certain plans for eligible employees.

We invest in our employees – Every employee is eligible for education reimbursement for certifications, degrees, or professional development.  Reimbursement amounts may fluctuate due to IRS limitations. We want you to grow as an expert and a leader and offer flexibility for you to take a course, complete a certification, or other professional growth and networking. We are committed to supporting your curiosity and sustaining a culture that prioritizes commitment to continuous professional development.

We work hard, we play hard. ITC is committed to incorporating fun into every day. We dedicate funds for activities – virtual and in-person – e.g., we host happy hours, holiday events, fitness & wellness events, and annual celebrations. In alignment with our commitment to our communities, we also host and attend charity galas/events. We believe in appreciating your commitment and building a positive workspace for you to be creative, innovative, and happy.

AAEO & VEVRAA

ITC is an Affirmative Action/Equal Opportunity employer and a VEVRAA (Vietnam Era Veterans' Readjustment Assistance Act) Federal Contractor. As such, any personnel decisions (hire, promotion, job status, etc.) on applicants and/or employees are based on merit, qualifications, competence, and business needs, not on race, color, citizenship status, national origin, ancestry, sexual orientation, gender identity, age, religion, creed, physical or mental disability, pregnancy, childbirth or related medical condition, genetic information of the employee or family member of the employee, marital status, veteran status, political affiliation, or any other factor protected by federal, state or local law.

ITC maintains a strong commitment to compliance with VEVRAA and other applicable federal, state, and local laws governing equal employment opportunity. We have developed comprehensive policies and procedures to ensure our hiring practices align with these requirements.

As a part of our VEVRAA compliance efforts, ITC has established an affirmative action plan that outlines our commitment to the recruitment, hiring, and advancement of protected veterans. This plan is regularly reviewed and updated to ensure its effectiveness.

We encourage protected veterans to self-identify during the application process. This information is strictly confidential and will only be used for reporting and compliance purposes as required by law. Providing this information is voluntary, and it will not impact your eligibility for employment.

Our commitment to equal employment opportunity extends beyond legal compliance. We are dedicated to fostering an inclusive workplace where all employees, including protected veterans, are treated with dignity, respect, and fairness.

How to Apply

To apply to IT Concept Positions- Please click on the: “Apply for this Job” button at the bottom of this Job Description or the button at the top: “Application.”  Please upload your resume and complete all the application steps. You must submit the application for IT Concepts to consider you for a position.  If you need alternative application methods, please email careers@useitc.com and request assistance.  

Accommodations

To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. Reasonable Accommodations may be made to enable qualified individuals with disabilities to perform the essential functions. If you need to discuss reasonable accommodations, please email careers@useitc.com. 

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Analytics Big Data Cloud Compliance Data Analytics Firewalls Linux Log files Mathematics Physics SIEM Splunk Threat detection

Perks/benefits: Career development Fitness / gym Health care Insurance Startup environment Team events Wellness

Region: North America
Country: United States
Job stats:  3  0  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.