We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Splunk Engineer

Peraton
United States, Maryland, Linthicum
Dec 20, 2025

Splunk Engineer
Job Locations

US-MD-Linthicum




Requisition ID
2025-162167

Position Category
Information Technology

Clearance
Top Secret/SCI



Responsibilities

Peraton is seeking an experienced Splunk Engineer to support a critical mission of national importance. The selected candidate will play a key role in designing, building, maintaining, optimizing, and modernizing our enterprise Splunk environment to ensure peak performance, scalability, and mission readiness. Front-end and back-end experience is required.

Responsibilities:

Front-end

    Architect and implement Splunk dashboards for data-center asset inventory and vulnerability reporting.
  • Build Executive dashboards that filter and highlight critical assets for situational awareness.
  • Normalize dashboard layouts, panels, and visualizations to a consistent styling and naming convention.
  • Optimize searches and SPL queries for performance and scalability.
  • Integrate new data sources and onboard security systems into Splunk.
  • Map CVE and asset owner data into asset-centric dashboards.
  • Produce and maintain dashboard documentation: data sources, queries, drill-downs, and user guides.
  • Collaborate with stakeholders to plan new dashboards, define requirements, wireframes, and success metrics.

Back-end

  • Administer and enhance existing Splunk Enterprise and Enterprise Security deployments across the enterprise.
  • Manage Splunk system administration, including operating system and application-level support.
  • Apply necessary upgrades, patches, and configuration changes to maintain secure and efficient operations.
  • Monitor, analyze, and troubleshoot logs to identify and resolve performance or integration issues.
  • Collaborate closely with both contractor and government teams to address technical challenges in real time.
  • Analyze and resolve system performance concerns such as latency, bottlenecks, and data flow interruptions.
  • Design and implement solutions based on stakeholder requirements, ensuring alignment with enterprise architecture goals.

Location: Baltimore metropolitan area



Qualifications

Required Qualifications:

  • Bachelor's degree in one of the following fields: Computer Science, Cybersecurity, Data Science, Information Systems, Mathematics, Software Engineering, or Information Technology with 8+ years of relevant experience; or Master's with 6+ years of relevant experience; Four years of additional experience can be considered in lieu of a Bachelor's degree.
  • Active TS clearance with SCI eligibility.
  • Active CompTIA Security+ certification.
  • 3 years proficiency with SPL, Dashboard Studio, data models, and the Asset Framework.
  • 3 years experience using the following tools and technologies: Splunk Enterprise (Search, SPL, Dashboard Studio, Data Models, Asset Framework), Splunk IT Service Intelligence (ITSI),Splunk Security Essential, JIRA, Git, REST APIs, JSON, Basic CSS/HTML for dashboard theming.
  • Technical Expertise: Proven hands-on experience administering and leading Splunk implementations, including Enterprise Security.

Preferred Qualifications:

  • Minimum 6 years hands-on experience building and supporting Splunk dashboards, reports, and saved searches.
  • Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Certified Ethical Hacker (CEH), Certified Authorization Professional (CAP).
  • Strong understanding of asset-centric reporting, CVE tracking, and executive situational awareness use cases.
  • Proven ability to optimize Splunk search performance and design intuitive UI layouts.
  • Excellent documentation skills and experience transferring knowledge to cross-functional teams.
  • In-depth understanding of the Continuous Diagnostics and Mitigation (CDM) program and its phases (vulnerability management, configuration management, identity and access management, and incident response).
  • Proficiency in Zero Trust principles, including micro-segmentation, least-privilege access, and continuous verification of users, devices, and services.
  • Expertise in the NIST Risk Management Framework (RMF) (SP 800-37/SP 800-53), from categorization through monitoring and continuous authorization.
  • Familiarity with the Cybersecurity Assessment and Secure Mission (CASM) model for evaluating control effectiveness and mission impact.


Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.



Target Salary Range

$135,000 - $216,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay.


EEO

EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
Applied = 0

(web-df9ddb7dc-hhjqk)