Role: Splunk Data Engineer
Location: North Quincy, MA, 02171
Fulltime
Salary Range: $120,000-$145,000/Year
Job Description :
Must Have Technical/Functional Skills
Responsibilities:
• Develop, configure, and maintain Splunk dashboards, reports, alerts, and correlation searches to support security monitoring and operational visibility.
• Build and optimize log ingestion pipelines, ensuring accurate parsing, enrichment, and normalization of log data across multiple sources.
• Create and maintain SOPs, runbooks, triage workflows, and incident remediation procedures for Splunk- based monitoring operations.
• Perform alert triage, event investigation, and root-cause analysis, leveraging Splunk queries and correlation logic.
• Continuously tune searches, dashboards, and alerts to improve detection quality and reduce noise/false positives.
• Partner with Security Operations, IT, Network, and Application teams to expand log coverage and improve monitoring use cases.
• Monitor Splunk platform health, performance, indexing, storage, and data ingestion to ensure high availability and reliability.
Requirements:
• Hands-on experience with the Splunk platform, including dashboard creation, search queries (SPL), reports, and correlation rule development.
• Proven expertise in log analysis, event correlation, and building end-to-end monitoring use cases.
• Experience in operationalizing Splunk through SOPs, triage processes, runbooks, and incident response workflows.
• Strong understanding of log formats (syslog, JSON, Windows events), ingestion methods, and data onboarding best practices. • Ability to perform incident triage, investigation, and remediation using Splunk Search Processing Language (SPL).
• Knowledge of security monitoring concepts, SIEM architecture, detection logic, and alert tuning.
• Strong communication and documentation skills, with the ability to collaborate across SOC, IT, and Engineering teams.
Desired Skills: Splunk
Please advise your interest in exploring this opportunity.
Sincerely Yours,
Shashi Bhushan
Diverse Lynx, LLC
300 Alexander Park Suite # 200
Princeton, NJ 08540
Tel: (732) 452-1006 Ext.344
shashi.bhushan@diverselynx.com
www.diverselynx.com
Diverse Lynx LLC is an Equal Employment Opportunity employer. All qualified applicants will receive due consideration for employment without any discrimination. All applicants will be evaluated solely on the basis of their ability, competence and their proven capability to perform the functions outlined in the corresponding role. We promote and support a diverse workforce across all levels in the company.
Location: North Quincy, MA, 02171
Fulltime
Salary Range: $120,000-$145,000/Year
Job Description :
Must Have Technical/Functional Skills
Responsibilities:
• Develop, configure, and maintain Splunk dashboards, reports, alerts, and correlation searches to support security monitoring and operational visibility.
• Build and optimize log ingestion pipelines, ensuring accurate parsing, enrichment, and normalization of log data across multiple sources.
• Create and maintain SOPs, runbooks, triage workflows, and incident remediation procedures for Splunk- based monitoring operations.
• Perform alert triage, event investigation, and root-cause analysis, leveraging Splunk queries and correlation logic.
• Continuously tune searches, dashboards, and alerts to improve detection quality and reduce noise/false positives.
• Partner with Security Operations, IT, Network, and Application teams to expand log coverage and improve monitoring use cases.
• Monitor Splunk platform health, performance, indexing, storage, and data ingestion to ensure high availability and reliability.
Requirements:
• Hands-on experience with the Splunk platform, including dashboard creation, search queries (SPL), reports, and correlation rule development.
• Proven expertise in log analysis, event correlation, and building end-to-end monitoring use cases.
• Experience in operationalizing Splunk through SOPs, triage processes, runbooks, and incident response workflows.
• Strong understanding of log formats (syslog, JSON, Windows events), ingestion methods, and data onboarding best practices. • Ability to perform incident triage, investigation, and remediation using Splunk Search Processing Language (SPL).
• Knowledge of security monitoring concepts, SIEM architecture, detection logic, and alert tuning.
• Strong communication and documentation skills, with the ability to collaborate across SOC, IT, and Engineering teams.
Desired Skills: Splunk
Please advise your interest in exploring this opportunity.
Sincerely Yours,
Shashi Bhushan
Diverse Lynx, LLC
300 Alexander Park Suite # 200
Princeton, NJ 08540
Tel: (732) 452-1006 Ext.344
shashi.bhushan@diverselynx.com
www.diverselynx.com
Diverse Lynx LLC is an Equal Employment Opportunity employer. All qualified applicants will receive due consideration for employment without any discrimination. All applicants will be evaluated solely on the basis of their ability, competence and their proven capability to perform the functions outlined in the corresponding role. We promote and support a diverse workforce across all levels in the company.
Top Searches
Job seekers searching for Diverse Lynx
Other job titles you may consider
Trending Searches in Quincy, IL
Jobs currently in Demand