This job is no longer available.
You can view related vacancies or set-up an email alert notification when similar jobs are added to the website using the buttons below.

Splunk Administrator - 6 Month Contract

jk3011_1543581494
£400 - £500 per day

Managing this Role

Josh Keeley

Manager - Cyber Specialist 0207 759 7878

With six years’ experience as an IT engineer within the Royal Marines, Josh has a strong network of ex-services CTI analysts and CCTIM qualified managers. Bringing sound technical knowledge and in-depth market expertise, Josh works with consultancies, defence, MSSPs and TIPs; from rapidly-growing start-ups to established global enterprises.

 

Seniority: Junior - Senior

Job Type: Permanent

Geographical coverage: London

Market: Cyber Security, Threat Intelligence, TIP’s and Professional Services

My Client, an exciting multinational technology company, is seeking a Splunk Administrator for a minimum 6 month contract engagement. SC clearance is a pre-requisite.

Based in Hampshire, the Splunk Administrator's responsibility will be the build and support of the Splunk environment. The Splunk Administrator will administer and configure the Enterprise Splunk monitoring suites, application performance management tools and log correlation tools to ensure system up-time. The successful candidate will also provide system performance analysis, and troubleshooting for production Windows server environment.

This will be your chance to serve as a Subject Matter Expert and support the IT Operations monitoring team.

There is also an attractive daily rate up for offer.

ESSENTIAL FUNCTIONS

  • Design system solutions and implement new features whilst resolving complex incidents and problems.
  • Administer Splunk users and roles.
  • Create advanced searches, reports, dashboards and visualizations.
  • Create field aliases, lookups, and calculated fields.
  • Create and manage alerts.
  • Implement and configuring index and source types as well as Splunk Apps.
  • Install and manage forwarders, indexers, search heads.
  • Create and manage configuration files like inputs props, transforms, and lookups.
  • Deploy, configure and update Indexers, Search Heads, Heavy Forwarders, and Universal Forwarders
  • Configure/optimize current Indexer configuration, Search Heads/Search Head Clusters, Deployment server & Monitoring Console.
  • Configure/optimize current storage as needed.

MINIMUM REQUIREMENTS

  • Bachelor's Degree in Business Technology, Management Information Systems preferred.
  • Must have three (3) years' experience in Splunk Systems Administration enterprise level environment.
  • Experience with managing a Splunk in a windows environment.
  • Linux administration or Splunk cloud administration experience.
  • Experience with planning for future Splunk growth, either on premise or cloud.
  • Splunk Certification is preferred but not essential.
  • SIEM knowledge is a plus.
  • Must have strong hardware and software troubleshooting skills.
  • Must have working knowledge of Windows server administration.
  • Must have working knowledge of Active Directory.
  • Must have general understanding of IT network and security procedures and standards.
  • Must have strong analytical and problem solving skills.
  • Must have exceptional communication and interpersonal skills in order to effectively communicate with a wide range of personnel.
  • Must have working knowledge of infrastructure management software such as VMWare vSphere, Hyper V, Citrix, Veeam and the like.
  • Must have working knowledge of server administration such as Microsoft Windows Active Directory, System Centre Configuration Manager (SCCM), Systems Centre Operations Manager (SCOM), IIS, Windows updates, backups, and reboots.

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.


This job has now been filled but you may be interested in:

 

SOC Analyst

Are you looking to work for one of the longest standing companies in the UK who live and breathe security? A company that will reflect your passion? My client is looking for a SOC Analyst who will be working in a secret location and who will deal with secret breaches and information.

You will be working alongside a large security team and will have scope to transfer to many different sections within the company should this be of interest. You must be eligible for a SC/DV clearance.

Roles and Responsibilities:

  • Provide analysis and trending of security log data from a large number of heterogeneous security devices
  • Provide threat and vulnerability analysis as well as security advisory services
  • Analyse and respond to previously undisclosed software and hardware vulnerabilities
  • Investigate, document, and report on information security issues and emerging trends
  • Provide support to the communication of relevant IT security procedure and/or process as relevant
  • To support delivery of aspects of an IT and/or Network Security procedure or processes, operations and architectural solution or security build
  • Completes assigned elements of IT security risk assessments and compliance audits
  • Manages where applicable team members to ensure high performing and well-motivated people delivering a specific function or service
  • Resolve and take ownership of customer incidents attending technical and service management bridge calls as required
  • Participate in the drafting of quality technical and incident reports as well as recommendations to the management team
  • Key role in passing on knowledge and skills across the operational support teams
  • Undergo additional training to match operational requirements and equipment
  • Provide support to the Service Management Teams (Capacity, Availability, Release, Information Security)

Skills and Requirements:

  • Experience working in a SOC, with knowledge of attack vectors, tactics and techniques
  • Networking, Windows and Linux knowledge
  • Industry Recognised Qualification from bodies such as COMPTIA or (ISC)2 or GIAC or equivalent experience would be desirable.
  • Experience of 1st line incident detection, hunting and response as well as the ability to analyse and manage response activities Knowledge of various security methodologies and processes, and experience with technical security solutions (SIEM firewall and intrusion detection systems)
  • Knowledge of TCP/IP Protocols, network analysis, and network/security applications
  • Ability to multi-task, prioritise, and manage time effectively, to deliver on agreed deadlines

 

Huntress Search Ltd does not discriminate on the grounds of 'protected characteristics' as defined under the Equality Act and other relevant UK legislation.

Huntress Search Ltd acts as a Recruitment Agency in relation to all Permanent roles and as a Recruitment Business in relation to all Temporary roles.

PLEASE NOTE: We can only consider applications from candidates who have the right to work in the UK.