Job Description
• Own day-to-day Splunk admin for SOC (backend): keep the platform healthy, stable, and performant.
• Onboard and maintain 10–20+ security log sources (estimate), including ongoing ingestion maintenance and troubleshooting.
• Manage/maintain configs related to ingestion pipelines, add-ons/apps, indexes/retention, and platform hygiene.
• Build/maintain integrations to ensure security telemetry flows reliably from cloud sources, endpoints, infrastructure, and security tools.
• Set up operational monitoring for Splunk itself (log source drops, ingestion failures, expensive searches).
• Partner with SOC analysts + infra/IAM teams to resolve access and telemetry issues quickly.
Participate in on-call focused on Splunk/logging continuity
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.
Required Skills & Experience
• 7+ years in Splunk administration / SIEM engineering / SOC tooling with real backend ownership
• Proven experience running Splunk in production (Splunk Cloud or Enterprise), including:
○ Log source onboarding + ingestion pipeline troubleshooting
○ Index/retention concepts and operational platform support
• Experience ingesting logs from a mix of sources such as:
○ Cloud log sources (Azure/AWS)
○ On-prem systems, Windows endpoints, Linux, firewalls, security tools, SaaS
• Strong troubleshooting ability: identify and fix source drops, ingestion failures, parsing/config issues, access problems.
• Working scripting ability (Python and/or PowerShell) for automation and operational efficiency.
Cost/performance awareness in Splunk (understands how ingestion volume and search behavior impact licensing and stability).
Nice to Have Skills & Experience
• Splunk cost optimization experience (reducing noisy data, improving search efficiency, retention tuning).
• Experience creating operational alerts (log drop/offline, ingestion errors, runaway searches).
• Familiarity with Splunk SOAR support (integrations/operations) — (not the main focus.)
• Strong documentation habits (runbooks, data flow diagrams).
Splunk certs: Core User/Power User/Admin/Architect.
Benefit packages for this role will start on the 1st day of employment and include medical, dental, and vision insurance, as well as HSA, FSA, and DCFSA account options, and 401k retirement account access with employer matching. Employees in this role are also entitled to paid sick leave and/or other paid time off as provided by applicable law.