×
Register Here to Apply for Jobs or Post Jobs. X

Splunk Engineer Security Clearance

Job in Herndon, Fairfax County, Virginia, 20170, USA
Listing for: Peraton
Full Time position
Listed on 2026-03-03
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer, IT Support
Job Description & How to Apply Below
Position: Splunk Engineer with Security Clearance
About Peraton Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace.

The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees solve the most daunting challenges that our customers face. Visit  to learn how we're keeping people around the world safe and secure. Program Overview About

The Role The Mid-Level Splunk Engineer supports enterprise-wide monitoring, alerting, and analytics across the customer's operational and security environments. This position develops and maintains custom Splunk dashboards, visualizations, and alerts that provide actionable insights for NOC and SOC personnel. The engineer ensures data integrity, visibility, and system performance across mission-critical networks and applications supporting government operations. This role bridges IT operations and cybersecurity by delivering analytics solutions that enhance situational awareness, reduce incident response time, and support compliance with NIST 800-171, and DoD 8570 requirements.

Responsibilities include, and resume must demonstrate experience with the following functions:
* Design, develop, and maintain custom Splunk dashboards, alerts, and reports to support both NOC and SOC operations.

* Onboard new data sources including network appliances, servers, security tools, and applications using forwarders, APIs, and syslog integrations.

* Implement data normalization using the Splunk Common Information Model (CIM) to support consistent reporting and event correlation.

* Develop and optimize SPL queries, regex extractions, and macros for high-performing searches and visualizations.

* Configure and tune threshold-based and adaptive alerts for system performance, security, and application availability.

* Collaborate with NOC and SOC analysts to define KPIs and ensure accurate visibility into network health and security posture.

* Support incident detection, triage, and root cause analysis using Splunk dashboards and search tools.

* Monitor and maintain the health and performance of Splunk Enterprise / Splunk Cloud environments.

* Integrate Splunk with automation/orchestration tools (e.g., Ansible, Service Now, SOAR platforms) for improved workflow efficiency.

* Document data source onboarding, dashboard configuration, and analytic processes in accordance with program SOPs.
Qualifications

Required Qualifications:

* TS/SCI with polygraph clearance adjudication or ability to obtain SCI and pass a poly

* Bachelor's degree in an area applicable to the position with 5+ years relevant experience. Will consider additional 4 years of experience in lieu of degree

* Active CompTIA Security+, CySA+, CASP+, CISSP, or equivalent DoD 8570 IAT Level II.

* 3-5 years of hands-on experience administering, configuring, and developing within Splunk Enterprise or Splunk Cloud environments.

* Demonstrated experience designing and maintaining custom dashboards, reports, and alerting frameworks.

* Strong proficiency in Splunk Search Processing Language (SPL), field extractions, and data model creation.

* Familiarity with Linux and Windows server environments, network protocols (TCP/IP, SNMP, syslog), and application log ingestion.

* Understanding of NOC/SOC workflows, event correlation, and log management best practices.

* Experience troubleshooting data ingestion, indexing, and search performance issues.

* Excellent communication, documentation, and collaboration skills.
Desired

Qualifications:

* Current Splunk Core Certified Power User, Admin, or Architect certification.

* Experience supporting federal or DoD environments and familiarity with RMF (Risk Management Framework).

* Experience with Python scripting, REST APIs, or JSON/XML…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary