SIEM Engineer - Splunk - INTL India

Post Date

Apr 07, 2026

Location

Portland,
Oregon

ZIP/Postal Code

97213
US
Jun 16, 2026 Insight Global

Job Type

Contract

Category

Security Engineering

Req #

HNW-d3130082-ae70-4754-8a6e-72b33bc4567e

Pay Rate

$10 - $13 (hourly estimate)

Job Description

The SIEM Senior Engineer is responsible for hands-on engineering, alert enrichment, and monitoring of security alerts using Splunk. This role focuses on building high-quality detections, enriching alerts with meaningful context, and improving SOC analyst efficiency by reducing false positives and improving signal quality. The role works closely with SOC Analysts, SIEM Leads, and Security Engineering teams.

We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.

Required Skills & Experience

• 5-8 years of experience in SIEM, SOC, or Security Engineering roles.
• Strong hands-on experience with Splunk
• Proven experience in SIEM alert creation, tuning, and enrichment.
• Strong understanding of security telemetry across endpoint, network, cloud, and IAM.
• Proficiency in SPL (Search Processing Language).
• Understanding of SOC workflows and incident triage.
• Familiarity with the MITRE ATT&CK framework.

Nice to Have Skills & Experience

• Experience integrating Splunk with IAM, CMDB, vulnerability, and threat intelligence tools.
• Exposure to SOAR platforms and automated response workflows.
• Scripting experience using Python or PowerShell.
• Experience working in regulated environments such as healthcare or financial services.
• Relevant Splunk or security certifications.

Benefit packages for this role will start on the 1st day of employment and include medical, dental, and vision insurance, as well as HSA, FSA, and DCFSA account options, and 401k retirement account access with employer matching. Employees in this role are also entitled to paid sick leave and/or other paid time off as provided by applicable law.