Compunnel, Inc.
We are seeking a highly skilled Sr. Splunk Administrator to design, maintain, and troubleshoot our SIEM environment.
The ideal candidate will have strong experience in Splunk architecture, data ingestion, dashboard creation, and incident response workflows.
This role requires hands-on expertise in Splunk core components and a deep understanding of system monitoring and log analysis.
Key Responsibilities
Design, maintain, and troubleshoot the SIEM environment using Splunk.
Develop advanced correlation rules, reports, and dashboards to detect emerging threats.
Manage and tune scripts that integrate with Splunk and other SIEM tools.
Configure and deploy data collection for various operating systems and network platforms.
Design and generate data parsers to optimize ingestion from servers, firewalls, and cloud applications.
Maintain documentation of security controls, policies, and procedures for the SIEM environment.
Create workflows for incident response within the SIEM tool.
Assist with incident response and cyber investigations.
Required Qualifications
Bachelor’s degree in Computer Science, Engineering, Information Security, or a related discipline. Minimum 3 years of experience with Splunk in enterprise environments. Splunk certification. Experience with design, implementation, and support of Splunk components (indexers, forwarders, search heads, cluster managers). Proficiency in configuring and administering Splunk ingestion and forwarding. Strong troubleshooting skills for Splunk dataflow issues and performance bottlenecks. Experience creating dashboards and analytics within SIEM tools. Familiarity with monitoring systems for auditing, incident response, and system health. Understanding of networking components, ports, protocols, and basic troubleshooting. Ability to troubleshoot log feeds, search time issues, and field extraction s. Preferred Qualifications
Ability to articulate dashboards through presentations. Excellent written and verbal communication skills. Certifications
Splunk certification required. Email ID * This field is required Please enter valid emailId. Cell phone * This field is required Please enter valid cell phone. First Name * This field is required Please enter valid first name. Last Name * This field is required Please enter valid last name.
#J-18808-Ljbffr
Bachelor’s degree in Computer Science, Engineering, Information Security, or a related discipline. Minimum 3 years of experience with Splunk in enterprise environments. Splunk certification. Experience with design, implementation, and support of Splunk components (indexers, forwarders, search heads, cluster managers). Proficiency in configuring and administering Splunk ingestion and forwarding. Strong troubleshooting skills for Splunk dataflow issues and performance bottlenecks. Experience creating dashboards and analytics within SIEM tools. Familiarity with monitoring systems for auditing, incident response, and system health. Understanding of networking components, ports, protocols, and basic troubleshooting. Ability to troubleshoot log feeds, search time issues, and field extraction s. Preferred Qualifications
Ability to articulate dashboards through presentations. Excellent written and verbal communication skills. Certifications
Splunk certification required. Email ID * This field is required Please enter valid emailId. Cell phone * This field is required Please enter valid cell phone. First Name * This field is required Please enter valid first name. Last Name * This field is required Please enter valid last name.
#J-18808-Ljbffr