drjobs
Splunk Engineer
drjobs Splunk Engineer العربية

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs

Job Location

drjobs

Dubai - UAE

Monthly Salary

drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

*Job Description: Splunk Certified Forensic Analyst*

*Position:* Splunk Certified Forensic Analyst

*Location:* Dubai

*Company:* Cyber Security

*About Us:*
Cyber Security & MSSP

*Job Description:*

We are seeking a highly skilled Splunk Certified Forensic Analyst to join our team. The ideal candidate will have a strong background in cybersecurity incident response and forensic analysis with extensive experience utilizing Splunk to investigate security incidents identify threats and implement proactive measures to safeguard our systems and data.

*Responsibilities:*

Conduct forensic investigations using Splunk to analyze security incidents identify root causes and develop remediation plans.
Collaborate with crossfunctional teams to respond to security incidents in a timely and effective manner.
Develop and maintain Splunk use cases dashboards and alerts to proactively monitor for security threats and vulnerabilities.
Provide technical expertise and guidance on the implementation and optimization of Splunk within the organization.
Stay uptodate on the latest cybersecurity trends threats and technologies to continuously improve our security posture.

*Requirements:*

Bachelors degree in Computer Science Information Security or related field.
Splunk Certified Forensic Analyst (CA210) certification required.
Minimum of 5 years of experience in cybersecurity with a focus on incident response and forensic analysis.
Extensive experience working with Splunk to perform forensic investigations analyze log data and develop use cases.
Strong understanding of security principles protocols and technologies.
Excellent analytical and problemsolving skills.
Effective communication and collaboration abilities.
CISSP CEH or other relevant certifications are a plus.

*Benefits:*
Outline the benefits package offered by the company.

*How to Apply:*
Provide instructions for applying including contact information or a link to the application portal.


*Splunk Use Case Blueprint:*

*Use Case Title:* Security Incident Investigation and Response

*Objective:*
To leverage Splunk for investigating security incidents identifying threats and responding promptly to mitigate risks.

*Components:*
1. *Data Collection:* Configure Splunk to ingest data from various sources including network devices servers applications and security tools.
2. *Use Case Development:* Develop specific use cases within Splunk to detect common security threats such as malware infections unauthorized access attempts and data breaches.
3. *Alerting Mechanism:* Implement realtime alerts and notifications within Splunk to alert security teams of potential security incidents.
4. *Forensic Analysis:* Utilize Splunks forensic capabilities to conduct indepth analysis of security incidents including timeline reconstruction file integrity monitoring and user behavior analytics.
5. *Incident Response:* Develop standardized procedures and workflows for responding to security incidents identified through Splunk including containment eradication and recovery steps.
6. *Continuous Improvement:* Regularly review and refine Splunk use cases alerts and response procedures based on lessons learned from past incidents and emerging threats.

*Benefits:*
Early detection and response to security incidents.
Improved visibility and situational awareness of the organizations security posture.
Enhanced forensic capabilities for thorough investigation and analysis of security events.


*Splunk Proof of Concept (PoC):*

*Objective:* To demonstrate the effectiveness of Splunk for security incident investigation and response within the organization.

*Key Steps:*
1. *Scope Definition:* Define the scope and objectives of the PoC including specific use cases to be tested.
2. *Data Collection:* Ingest sample data into Splunk from representative sources such as firewall logs endpoint logs and authentication logs.
3. *Use Case Implementation:* Implement selected security use cases within Splunk to detect predefined security threats.
4. *Testing and Validation:* Conduct testing to validate the effectiveness of Splunk in detecting and responding to simulated security incidents.
5. *Documentation:* Document the findings including any challenges encountered and lessons learned during the PoC.
6. *Presentation:* Present the results of the PoC to key stakeholders highlighting the benefits and potential impact of adopting Splunk for security operations.

*Success Criteria:*
Successful detection and response to simulated security incidents.
Positive feedback from stakeholders on the effectiveness and usability of Splunk.
Alignment of Splunk capabilities with the organizations security requirements and objectives.


*Core Splunk Resource with 5 Years of Experience:*

*Name:* Candidates Name

*Profile Summary:*
A highly skilled and experienced Splunk professional with over 5 years of handson experience in implementing and managing Splunk for security operations. Possesses a strong background in cybersecurity incident response and forensic analysis with a proven track record of leveraging Splunk to detect investigate and respond to security threats effectively.

*Key Skills:*
Splunk Enterprise and Splunk Enterprise Security
Splunk Certified Forensic Analyst (CA210)
Security Information and Event Management (SIEM)
Log Management and Analysis
Incident Response and Forensic Analysis
Use Case Development and Implementation
Dashboards and Visualization
Data Onboarding and Parsing
Scripting (Python Bash)
Security Certifications (CISSP CEH)

*Professional Experience:*
Outline the candidates relevant work experience highlighting key accomplishments and projects related to Splunk implementation and security operations.

*Education:*
Bachelors Degree in Computer Science Information Security or related field.

*Certifications:*
Splunk Certified Forensic Analyst (CA210) 7
Any other relevant certifications

*References:*
Available upon request.


This comprehensive package includes a job description for a Splunk Certified Forensic Analyst a use case blueprint for security incident investigation and response a proof of concept plan for demonstrating Splunks effectiveness and a profile template for a core Splunk resource with 5 years of experience. These resources can be customized and adapted to suit the specific needs and requirements of your organization.

cybersecurity,develop use cases,incident response,identify threats,forensic analysis,develop standardized procedures and workflows for responding to security incidents,containment, eradication, and recovery steps,cissp,implement proactive measures,develop use cases within splunk,collaborate with cross-functional teams,develop remediation plans,splunk,investigate security incidents,stay up-to-date on cybersecurity trends,configure splunk,ceh,conduct in-depth analysis of security incidents,implement real-time alerts and notifications,develop dashboards,use case,develop alerts,security

Employment Type

Full Time

Company Industry

About Company

0-50 employees
Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.