Enterprise Splunk Logging and Data Services Systems Administrator at Verizon Communications in Ashburn, VAother related Employment listings - Ashburn, VA at Geebo

Enterprise Splunk Logging and Data Services Systems Administrator at Verizon Communications in Ashburn, VA

What you'll be doing The Verizon Corporate Information Security (CIS) organization securely enables the business by protecting assets and information across Verizon networks, infrastructure and applications. CIS integrates cybersecurity governance, policies, technologies and operations across Verizon, and works to incorporate security into the design of technology systems and services. The Security Event Services (SES) team provides enterprise-wide logging services under the direction of Corporate Information Security (CIS). SES is responsible for collecting, processing, storing, and sharing large volumes of data from corporate information assets. Our principal partners are Security and Operations, who use our service to develop information for making decisions to protect and enable the business. The SES team provides leadership for the design, engineering and implementation of security event data collection related to Incident Response, Threat Monitoring, Threat Intelligence, and Operations. These programs pertain to the data identification, assessment, ingestion, normalization and enrichment activities necessary for our security operations centers to execute proper detection and analytics of threats and response. The CIS Data Management and Protection directorate is developing a new data-broker/pre-ingestion service to optimize how data is collected, processed, and delivered to downstream security workflows. Perform system administration tasks to leverage new broker services to optimize enterprise logging and SIEM workflows. Manage enterprise logging infrastructures enabling mission critical security workflows. Deploy and manage Splunk application services across AWS and on-premise data center networks. Perform Splunk application systems administration. Perform other systems administration tasks including systems monitoring, troubleshooting, and configuration management. Develop and maintain technical infrastructure and workflow documentation. Manage task and project documentation using Jira, Confluence, and other workflow tools. Develop test plans, document change control proposals, and deploy configuration changes via Git, Jenkins, Ansible, and other workflow orchestration tools. Document and share recommendations with peers and leadership teams. Identify, troubleshoot, and resolve service interruptions affecting data brokering and enterprise security logging platforms. In this remote role, you'll work from home with occasional in-person training and meetings. What we're looking for You'll need to have:
Bachelor's degree or four or more years of work experience. Four or more years of relevant work experience. Experience within IT operations, application and/or infrastructure support. Experience working with Splunk in an enterprise environment. Even better if you have:
A degree. Ability to work together with senior technical staff to clearly define/understand strategic goals and identify technologies which can be leveraged to provide solutions. Strong documentation and communication skills. Technical knowledge and skills related to security infrastructures, Unix/Windows systems administration, data collection and monitoring technologies, and Splunk application services. Knowledge of Splunk logging platform infrastructure and data ingestion workflows. Ability to work with minimal supervision. Ability to prioritize tasks and complete goals independently or via self-directed collaboration with peers. Experience with monitoring, detecting, and responding to technical conditions affecting service quality. Ability to Independently research technical documentation needed to troubleshoot and resolve project and task objectives. Knowledge of common information technology topics including IP networking and Unix and Windows systems administration. Experience managing enterprise Splunk and large-scale logging and data collection technologies. Experience developing and optimizing Splunk Search Processing Language (SPL). Knowledge of regular expressions and shell scripting. Knowledge of common network security concepts including firewalls and identity and access management. Ability to evaluate technical and administrative conditions to manage priorities. Good verbal and written communication skills. Ability to work independently and also with a team to complete tasks and projects. CISSP, Splunk or other related certifications or willingness to obtain within 12 months of hire.
Salary Range:
$80K -- $100K
Minimum Qualification
System & Network Administration, Systems Architecture & EngineeringEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.