Splunk ITSI Engineer, Senior Systems Engineer

As a Senior Systems Engineer on our team, you have the opportunity to work  independently and in a lead technical role to design and implement cutting edge and best in class engineering, data and cyber security strategies to support a large distributed clustered Dynatrace and  Splunk environment consisting of Search Heads, Indexers, Forwarders, and Splunk Enterprise Security (ES) Applications spanning security, performance, engineering, and operational roles. Consult on and lead vulnerability identification, new cyber security threat exposures and emerging security technology  research. Develop business and advanced systems engineering solutions to complicated analytical and  technical problems. Practically apply engineering and Splunk system specific highly specialized knowledge to analyze high volumes of machine generated data including security technology data such as network, endpoint, access, malware, vulnerability and identity information. 

Qualification Requirements, Education and Experience: 

    • Master’s Degree in computer science, electronics engineering or other engineering or technical discipline is required at a minimum  
    • 10+ years of experience as a Senior Systems Engineer providing technical support in system  architecture, system design, system integration and technical management 
    • 10+ years of experience as a Senior Systems Engineer assisting in providing technical input to  the systems engineering process. Leads teams in developing application and technical plans
    • 10+ years of experience as a Senior Systems Engineer leading teams in developing application and technical plans 
    • 10+ years of experience as a Senior Systems Engineer guiding customers in the installation and use of strategic products through education and guidance, first-use and tuning assistance  problem solving and critical situation resolution 
    • 4+ years of experience in a Splunk ITSI engineering role supporting security operations center  (SOC) or network operations center (NOC) environments 
    • 3+ years of experience with business and IT Service monitoring, intelligent incident management  and machine learning and predictive analytics 
    • Experience with Dynatrace or AppDynamics and in data engineering with Splunk ITSI for both ingestion and extraction 
    • Experience with maintaining Splunk and Dynatrace and its underlying infrastructure
    • Experience with Windows and Linux Operating systems, services, daemons, containers, and virtual machines (VMs)
    • Experience with troubleshooting and identifying root cause issues 
    • Experience in service tree mapping 
    • Experience in creating and maintaining TA’s (technology add on) and UF (Universal Forwarders)
    • Experience in Service Now 
    • Ability to work cross-functionally with application teams to modernize applications where  appropriate 
    • Ability to support cloud integration efforts with Splunk and Dynatrace 
    • Ability to obtain and maintain a Public Trust or Suitability/Fitness determination based on client requirements 

Candidates who do not meet experience requirements will not be considered.

To apply for consideration, please submit a comprehensive resume tailored to this job description. All work experience must include start and end dates (month and year). Education must cite school, degree, year degree completed. Minimum required experience and education must be clearly illustrated in your resume. Offer to candidates is contingent upon successful background and clearance adjudication. Please submit your resume to careers@leorose.com with the role title in the subject line.