Logo for Tangent Technologies LLC

Intermediate Splunk Engineer

Roles & Responsibilities

  • 3–6 years of experience in cybersecurity operations, SIEM administration, or system engineering
  • Hands-on experience with Splunk Enterprise or similar SIEM platforms
  • Experience onboarding log sources and configuring Splunk forwarders
  • Experience creating search queries, dashboards, and reports

Requirements:

  • Support administration and maintenance of Splunk Enterprise environments
  • Configure and maintain log ingestion and Splunk forwarders
  • Onboard new data sources, applications, and infrastructure logs
  • Develop and maintain Splunk dashboards, searches, and reports

Job description

Tangent Technologies is seeking an Intermediate Splunk Engineer with experience to support the sustainment and administration of enterprise Splunk SIEM environments. This position focuses on maintaining Splunk infrastructure, onboarding log sources, supporting dashboards and searches, and assisting cybersecurity teams with log analysis. This position supports a US Government Agency and the candidate must be a US Citizen. 

This role is 100% remote, making it an excellent opportunity for a mid-level Splunk engineer who wants to grow their SIEM engineering skills while supporting federal cybersecurity programs.

Key Responsibilities

  • Support administration and maintenance of Splunk Enterprise environments

  • Configure and maintain log ingestion and Splunk forwarders

  • Onboard new data sources, applications, and infrastructure logs

  • Develop and maintain Splunk dashboards, searches, and reports

  • Assist with field extractions, log parsing, and normalization

  • Support cybersecurity teams by running log queries and event analysis

  • Assist with alert tuning and detection use case development

  • Troubleshoot Splunk search performance and indexing issues

  • Maintain documentation related to log sources, dashboards, and monitoring capabilities

Required Qualifications
  • 3–6 years of experience in cybersecurity operations, SIEM administration, or system engineering

  • Hands-on experience with Splunk Enterprise or similar SIEM platforms

  • Experience onboarding log sources and configuring Splunk forwarders

  • Experience creating search queries, dashboards, and reports

  • Familiarity with Linux or Windows system logs
  • Understanding of network protocols (TCP/IP, DNS, HTTP)
  • Strong troubleshooting and documentation skills


Preferred Qualifications

  • Splunk Power User or Splunk Admin certification

  • Experience supporting Splunk Enterprise Security

  • Experience in a Security Operations Center (SOC)

  • Familiarity with log parsing, regex, or scripting

  • Experience integrating cloud, endpoint, or network security logs


​​​​Federal Suitability and Background Investigation

This position supports a federal financial regulatory agency. Candidates selected for this role will be required to successfully complete a government background investigation prior to beginning employment.

The investigation may include verification of employment history, criminal history, education, and a review of financial responsibility and credit history consistent with federal suitability requirements for individuals supporting financial regulatory agencies.

Employment is contingent upon the candidate’s ability to obtain and maintain the required suitability determination.

Related jobs

We help you get seen. Not ignored.

We help you get seen faster — by the right people.

🚀

Auto-Apply

We apply for you — automatically and instantly.

Save time, skip forms, and stay on top of every opportunity. Because you can't get seen if you're not in the race.

AI Match Feedback

Know your real match before you apply.

Get a detailed AI assessment of your profile against each job posting. Because getting seen starts with passing the filters.

Upgrade to Premium. Apply smarter and get noticed.

Upgrade to Premium

Join thousands of professionals who got noticed and hired faster.