"Alerted.org

Job Title, Industry, Employer
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Advanced Search

Advanced Search

Cancel
Remove
+ Add search criteria
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Related to

  • Mid/Sr SIEM (Security Information and Event…

    BAE Systems (Aurora, CO)



    Apply Now

    Job Description

    The selected candidate will be responsible for configuring the collection, parsing, correlation, and visualization of events for a critical operational system. She/he will demonstrate strong skills in system administration, log management, event correlation, and threat detection, and will support building and maintaining a system that analyzes collected data and derives facts, inferences, and projections to determine if the systems being monitored are operating normally. The individual will work on a team responsible for configuring the systems which support analysts and end-users. She/he will support the collection and extraction of data used to refine existing and new reports, analytics, and dashboards, and will be involved with the drafting and creation of reports and dashboards based on end-user requirements. The selected candidate will also support the integration of resources across teams to better define the audit data being collected to eliminate false positives and false negatives from the data.

     

    Required Education, Experience, & Skills

     

    At least 2 years of experience with one or more of the following: StealthWatch, TripWire, Zenoss, ArcSight, Splunk.

     

    Splunk Certified Admin strongly preferred. If not Certified, must have extensive, in-depth experience in the** **_engineering_** **and administration of SPLUNK.

     

    Experience in design, implementation, and support of Splunk core components, including: indexers, forwarders, search heads, and cluster managers.

     

    Experience with configuration and administration of Splunk ingestion and forwarding for new and existing applications and data.

     

    Experience with troubleshooting Splunk dataflow issues between the various Splunk core components.

     

    Experience configuring and deploying data collection for a variety of operating systems and networking platforms.

     

    Experience creating Dashboards and Analytics within SIEM tools.

     

    Experience working with monitoring systems supporting auditing, incident response, and system health.

     

    Must have a solid understanding of networking components and devices, ports, protocols, and basic networking troubleshooting steps.

     

    Must have the ability to troubleshoot issues with log feeds, search time, and field extractions.

     

    Must have the ability to troubleshoot problems related to data solutions.

     

    If not located in Maryland, must be available to travel up to 25% of the time.

    Preferred Education, Experience, & Skills

    + Bachelor's Degree in Computer Science, Engineering, Information Assurance, or a related discipline.

     

    Network Security Operations Center (SOC) experience.

     

    Experience and talent in data visualization.

     

    Extensive experience creating workflows for Incident Response within a SIEM Tool.

     

    Security Certification.

     

    GIAC Certified Incident Handler Certification.

     

    GIAC Cyber Threat Intelligence Certification.

     

    Cybersecurity certifications.

     

    Formal SIEM training.

     

    Experience working on an Agile team/program.

    \#MDOPS

    \#LI-KK2

    Pay Information

     

    Full-Time Salary Range: $130355 - $221603

     

    Please note: This range is based on our market pay structures. However, individual salaries are determined by a variety of factors including, but not limited to: business considerations, local market conditions, and internal equity, as well as candidate qualifications, such as skills, education, and experience.

     

    Employee Benefits: At BAE Systems, we support our employees in all aspects of their life, including their health and financial well-being. Regular employees scheduled to work 20 hours per week are offered: health, dental, and vision insurance; health savings accounts; a 401(k) savings plan; disability coverage; and life and accident insurance. We also have an employee assistance program, a legal plan, and other perks including discounts on things like home, auto, and pet insurance. Our leave programs include paid time off, paid holidays, as well as other types of leave, including paid parental, military, bereavement, and any applicable federal and state sick leave. Employees may participate in the company recognition program to receive monetary or non-monetary recognition awards. Other incentives may be available based on position level and/or job specifics.

     

    Mid/Sr SIEM (Security Information and Event Management) Engineer / Splunk Admin

    110426BR

    EEO Career Site Equal Opportunity Employer. Minorities . females . veterans . individuals with disabilities . sexual orientation . gender identity . gender expression

     


    Apply Now



Recent Searches

[X] Clear History

Recent Jobs

  • Mid/Sr SIEM (Security Information and Event Management) Engineer / Splunk Admin
    BAE Systems (Aurora, CO)
  • Info Systems Security Manager
    University of Florida (Gainesville, FL)
  • Automotive Demo Platform Engineer - Staff Engineer
    Qualcomm (San Diego, CA)
  • Java Staff Software Engineer (Bentonville, AR)
    Insight Global (Bentonville, AR)
[X] Clear History

Account Login

Cancel
 
Forgot your password?

Not a member? Sign up

Sign Up

Cancel
 

Already have an account? Log in
Forgot your password?

Forgot your password?

Cancel
 
Enter the email associated with your account.

Already have an account? Sign in
Not a member? Sign up

© 2025 Alerted.org