Information Security Manager (Splunk Manager)

21 Feb 2025

Vacancy expired!

We have

W2

Contract Position as an

Information Security Manager (Splunk) role with one of our

direct clients in

Culver City, CA

Location: Culver City, CA (Onsite)

Job Description: Info Security Team looking for a Senior Manager of Security Data Analytics. Ideally looking for a diverse candidates with experience managing 12-13 vendors who use Splunk to coordinate onboarding data, work on dashboards, conduct data analytics, Data Loss Prevention, etc. Experience managing similar teams and working within data set systems required, Splunk is ideal but other platforms like Azure are okay.

Information Security team are currently looking for a Security Data Analytics Sr. Manager to join their team and be responsible for launching and managing the information security data analytics team. The Security Data Analytics Sr. Manager will oversee a team of offshore resources who will ensure critical InfoSec Data is collected, analyzed, reported, and actioned. This role requires out-of-the-box thinking, detail-orientation, problem solving, and innovative proposals. Additionally, this position will work closely with incident response, cyber threat, vulnerability management, security operations, data loss prevention, security awareness and training, and IT peers to meet alerting, reporting and dashboarding requirements.

Core Responsibilities
  • Provide technical and team leadership to a team of data engineers. You’ll split your time between removing technical obstacles for your team, vetting their designs, and coaching them to realize their full potential, while also building things yourself.
  • Be a subject matter expert in big data analytics (Splunk/PowerBI/Tableau)
  • Oversee the implementation of new analytic techniques and technologies to provide insight into threats to SPE and tool and process effectiveness
  • Oversee correlation of multiple data sources to present an effective measurement of SPE’s global risk
  • Oversee basic programming and development of scripts in support of the data analytics team
  • Design, document, and implement a repeatable data onboarding process
  • Responsible for ensuring routine (daily, weekly, monthly, quarterly) reports are accurate and produced on time
  • Responsible for insuring data health of all critical data systems
  • Provide expert level technical advice to the InfoSec team
  • Meeting with stakeholders across teams to determine data workflows and documentation
  • Managing Workload – Manages multiple tasks, with the ability to deal with ambiguity and shifting priorities
  • Some travel may be required
In order to be considered for this role, candidates will need to meet the following background:

Functional knowledge of:
  • Expert level knowledge of Splunk (essential)
  • Data Analytic approaches and concepts
o Pattern Analysiso Trend identificationo Cluster analysiso Predictive Analysiso Diagnostic Analysis
  • Interpreting, searching, and manipulating data within enterprise logging solutions (essential)
  • Working with network, host, and user activity data, and identifying anomalies (essential)
  • Information security, client/server architectures, and networking (essential)
  • Current and evolving cyber threat landscape (essential)
  • Threat intelligence and applied use within incident response and forensic investigations (essential)
  • Understanding of attack techniques (essential)
  • Programming and scripting to support data analysis (essential)
  • Multilayer security architectures and controls (desirable)
  • Application architecture (mainframes, databases, web, middleware, virtual) (desirable)
  • Vulnerability analysis (desirable)
  • Training & Awareness through Phishing Simulation (desirable)

Technical/Certification Essential (Must have one or more)
  • Information Security certification (SSCP, CISSP, CISM, etc.)
  • Incident and Forensic Security certification (GMON / GCIH, etc.)
  • Ethical hacking certifications (CEH, etc.)
  • Splunk Certified Architect

Background/Tools/SkillsEducation (essential)o Bachelor’s degree or equivalent working experienceo SIEM Certification (Splunk, ArcSight, PowerBi, Etc.)o 7+ years of experience in Data Analytics or Data Scienceo 7+ years of experience in Security Operations and/or Security Engineeringo 3+ years leading a team or programo 2+ years of experience in Incident Response and/or Cyber Threato 2+ years managing vendor relationships

Tool Experienceo Big Data Tools: Splunk, PowerBi, ArcSight (essential)o Ticketing Systems: ServiceNow / Jira / Archer (desirable)o Endpoint Security Products: McAfee / Qualys / Symantec DLP / Window Event Logs / Linux Auditd/ Sysmon (essential)o Network Security Products: PaloAlto, Cisco (essential)
  • Knowledge of
o Logging strategies, formats, and best practices (essential)o Data analytic techniques (essential)o Reporting and Dashboard development and execution (essential)o Cloud Environments (AWS, Azure, Google Cloud Platform, O365) (desirable)o Hacker techniques, tools, and motivationso Operating systems (Windows, OS X, Linux and UNIX) (essential)o Network architecture (firewalls, routers, switches and load balancers) (essential)o Security technologies (IDS/IPS, advanced endpoint protection, AV) (essential)o Applicable data privacy laws (CCPA, CPRA, GDPR, etc.) (essential)

Experience in:o Analyzing and onboarding various security logs (essential)o Assessing technology deployment and/or environment for implementation of best practice and/or creative logging solutions to support InfoSec and business needso Excellent data analysis skills (essential)o Experience supporting a SOC (Security Operations Center)o Experience developing security use cases and alertingo Problem solving with missing information while under pressure with short deadlines (essential)o Indicator pivoting, tracking and analysis (essential)o Ability to prioritize multiple tasks rapidly, formulate a plan, delegate tasks, respond quickly and communicate with customers and leadership (essential)o Generating both technical and executive reports, dashboards, and briefings (essential)o Working with and communicating with IT tool and solution owners (essential)

Other Desirable Skills:o Programming in one or more of the following: SPL, SQL, Python, ASM (desirable)o Shell scripting in one or more of the following: Perl, Bash, PHP, WMI, PowerShell (desirable)

Ability to:o Manage an offshore team (14 people)o Ability to develop and communicate a team strategyo Take on new responsibilities and influence others as needed to deliver consistent resultso Work in a global environment and manage issues across multiple locationso Strong written & verbal communications skillso Strong organizational and multi-tasking skillso Pick up new skills through self-learning and on the job trainingo Innovate and stay current on security technologieso Attention to detail with flexibility in addressing changing requirements

  • ID: #49338048
  • State: California Culvercity 90230 Culvercity USA
  • City: Culvercity
  • Salary: $70 - $80
  • Job type: Contract
  • Showed: 2023-02-21
  • Deadline: 2023-04-18
  • Category: Et cetera