Security Operations Engineer - Splunk/Cribl @ Fulcrum Technology Solutions | Jobright.ai
JOBSarrow
RecommendedLiked
0
Applied
0
External
0
Security Operations Engineer - Splunk/Cribl jobs in United States
Be an early applicantLess than 25 applicants
company-logo

Fulcrum Technology Solutions · 4 hours ago

Security Operations Engineer - Splunk/Cribl

ftfMaximize your interview chances
ConsultingInformation Technology

Insider Connection @Fulcrum Technology Solutions

Discover valuable connections within the company who might provide insights and potential referrals.
Get 3x more responses when you reach out via email instead of LinkedIn.

Responsibilities

Manage and optimize Splunk environments to support security monitoring, incident detection, and response.
Develop, maintain, and fine-tune Splunk dashboards, alerts, and reports for comprehensive visibility.
Use Cribl to route, reduce, and enrich logs for efficient ingestion into Splunk and other SIEMs.
Design and maintain scalable log aggregation pipelines, ensuring data quality and relevance.
Collaborate with the SOC and incident response teams to create custom detection rules, playbooks, and threat-hunting queries.
Identify and address gaps in security monitoring by integrating new data sources into Splunk.
Ensure optimal performance of Splunk and Cribl systems by implementing best practices and regular updates.
Troubleshoot and resolve issues in log ingestion, processing, and storage workflows.
Work closely with IT, DevOps, and application teams to onboard critical data sources.
Provide training and documentation to junior analysts and stakeholders on Splunk and Cribl usage.

Qualification

Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.

Splunk EnterpriseCribl LogStreamPythonSIEM configurationsNISTMITRE ATT&CKISO 27001ElasticGraylogAWSAzureGCPSplunk Certified AdminCribl Certified AdministratorCISSPBashLog analysisIncident responseData ingestion pipelines

Required

Proficient in configuring and managing Splunk Enterprise and Splunk Cloud
Hands-on experience with Cribl LogStream for log parsing, routing, and enrichment
Strong scripting skills (e.g., Python, Bash) for automation and custom integrations
Familiarity with security frameworks such as NIST, MITRE ATT&CK, or ISO 27001
Experience with log analysis, SIEM configurations, and incident response processes
Proven ability to optimize data ingestion pipelines and manage large-scale log environments
Strong problem-solving skills and the ability to operate under pressure during incidents
Bachelor’s degree in Computer Science, Information Security, or a related field (or equivalent work experience)
3+ years of experience in security operations, with a focus on log management and monitoring tools

Preferred

Familiarity with additional log management tools (e.g., Elastic, Graylog)
Knowledge of cloud environments (e.g., AWS, Azure, GCP) and their logging services
Certifications such as Splunk Certified Admin, Cribl Certified Administrator, or CISSP

Company

Fulcrum Technology Solutions

twittertwittertwitter
company-logo
Fulcrum Technology Solutions specializes in technology consulting, data networking, managed infrastructure, security and support services.

Funding

Current Stage
Growth Stage

Leadership Team

leader-logo
Kevin Kilgo
Chief Technology Officer
linkedin
leader-logo
Heather Gisin
CMO
linkedin
Company data provided by crunchbase
logo

Orion

Your AI Copilot