user avatar

4229 Senior Cybersecurity Specialist

Procession Systems

Posted 2 months ago
Secret
Unspecified
Unspecified
IT - Security
Washington, DC (On-Site/Office)

OVERVIEW:

The DI&I Analyst (Mid) provides operational and engineering support for Treasury's enterprise Splunk environment under TESIEMS. This role focuses on administering Splunk, onboarding new data sources, ensuring data quality and normalization, and maintaining continuous visibility across enterprise systems. The analyst plays a key role in enabling Treasury's SOC teams to detect, analyze, and respond to cybersecurity threats by ensuring critical data is ingested, structured, and available for security operations and compliance reporting.

GENERAL DUTIES:
  • Perform day-to-day administration of Splunk, including monitoring system health, managing indexes, and troubleshooting ingestion or search performance issues.
  • Support Splunk operations in hybrid environments (on-prem servers, AWS compute/storage, Linux VMs).
  • Apply patches, upgrades, and configurations to maintain stability and compliance of Splunk infrastructure.
  • Onboard new data sources into Splunk using syslog, HTTP Event Collector (HEC), JSON feeds, and APIs.
  • Normalize and validate ingested data to ensure alignment with Splunk Common Information Model (CIM) and SOC use cases.
  • Collaborate with system owners, engineers, and SOC analysts to configure log forwarding and resolve onboarding issues.
  • Develop and maintain ingestion pipelines that support large-scale Treasury SOC operations. Tune parsing, field extractions, and sourcetypes for optimal indexing and search performance.
  • Document and maintain data onboarding procedures, schemas, and configuration standards. Ensure Splunk onboarding and data retention configurations align with Treasury's security and compliance requirements (NIST RMF, FISMA, CCRI).
  • Generate audit-ready intake documentation and data validation reports for compliance reviews. Work with compliance and CD&M teams to ensure Splunk data supports continuous monitoring and reporting mandates.
  • Provide Tier II/III Splunk intake and admin support, escalating complex issues to senior Splunk engineers as required.
  • Partner with SOC analysts and CD&M engineers to ensure onboarded data supports detection, dashboards, and reporting needs.
  • Contribute to DI&I process improvement initiatives to streamline intake and optimize operational workflows.


REQUIRED QUALIFICATIONS:
  • Bachelor's degree from an accredited institute in an area applicable to the position in Cybersecurity, Computer Science, Information Systems, or a related discipline.
  • Seven (7) years experience. Three additional years of experience in lieu of degree.
  • Deep technical knowledge and proficiency in cybersecurity principles and practices.
  • Problem-solving complex and unclear technical issues.
  • Collaboration with internal cybersecurity experts. Strong analytical and critical thinking skills. Understanding of impact assessment on end-products or solutions.
  • Broad technical understanding of related cybersecurity specialty areas. Ability to develop and implement technical solutions independently.
  • Familiarity with incident detection, response, and security event management.
  • Proficiency in tools such as SIEMs (e.g., Splunk), IDS/IPS, endpoint detection, and scripting languages.
  • Familiarity with NIST SP 800-53, FISMA, and risk management frameworks.
  • Experience with scripting (e.g., Python, Bash) and log data analysis.
  • Relevant certifications, such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Cyber Security Analyst + (CySA+) are highly desirable.
  • Splunk Administration: Experience with Splunk Enterprise administration, including indexes, user management, and system performance.
  • Splunk Data Onboarding: Hands-on experience onboarding data sources using syslog, HEC, JSON, APIs, and other ingestion methods.
  • Splunk CIM: Strong understanding of the Splunk Common Information Model and ability to normalize data to CIM standards.
  • Infrastructure Knowledge: Familiarity with on-prem servers, AWS compute/storage, virtual machines, and Linux environments.
  • Data Quality: Ability to validate, troubleshoot, and normalize log data for operational and compliance use.
  • Scripting & Automation: Working knowledge of Python, Bash, or PowerShell for ingestion testing and automation tasks.
  • Security & Compliance Alignment: Understanding of NIST SP 800-53, FISMA, FedRAMP, DISA STIGs, and their application in SOC environments.
  • Collaboration: Strong communication skills for working with SOC teams, CD&M engineers, and system stakeholders.


CLEARANCE:
  • Secret minimum
group id: 90943786
job ad image
Find Procession Systems on Social Media
Network Employers
user avatar
About Us
At Procession Systems we work on identifying top talent across various markets. We work with some of the world’s leading government contractors, ranging in size, taking on some of the biggest challenges in the defense, civilian, and Intelligence markets. Not only do we identify top talent in this space for our clients, but a well cared for candidate experience is our priority. At Procession Systems we are dedicated to your needs and here to serve you as you advance in your career!
job ad2 image

Procession Systems Jobs


Job Category
IT - Security
Clearance Level
Secret