Cyber Splunk Subject Matter Expert

⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for a Cyber Splunk Subject Matter Expert (Insider Threat Engineer) in Maryland, offering a W2 contract for 7+ years of experience in cybersecurity, expertise in Splunk, automation skills with Ansible and Python, and a Bachelor's degree.
🌎 - Country
United States
πŸ’± - Currency
$ USD
-
πŸ’° - Day rate
-
πŸ—“οΈ - Date discovered
August 15, 2025
πŸ•’ - Project duration
Unknown
-
🏝️ - Location type
On-site
-
πŸ“„ - Contract type
W2 Contractor
-
πŸ”’ - Security clearance
Unknown
-
πŸ“ - Location detailed
Maryland, United States
-
🧠 - Skills detailed
#Computer Science #Cybersecurity #Python #Security #Firewalls #Automation #Programming #Compliance #Ansible #Data Ingestion #Splunk #Monitoring #Leadership #JSON (JavaScript Object Notation)
Role description
Cyber Splunk SME (Insider Threat Engineer) – Maryland. (On-site) Note: No C2C Profile. It's Purely a W2 Contract Role. We are seeking an experienced Cyber Splunk Subject Matter Expert to join our team as an Insider Threat Engineer. This pivotal role focuses on engineering, automation, and advanced cyber threat detection to protect critical systems and sensitive data. Key Responsibilities: β€’ Engineer and maintain User Activity Monitoring (UAM) solutions for continuous visibility into user and privileged behaviors. β€’ Build and optimize Splunk dashboards to visualize insider threat indicators and program metrics. β€’ Automate detection, alerting, and reporting workflows using Ansible, Python, and JSON. β€’ Integrate UAM with enterprise cybersecurity tools such as SIEM, DLP, EDR, and SOAR. β€’ Collaborate with SOC, forensic analysts, and threat intel teams to enhance UAM context. β€’ Develop and refine methods to analyze and correlate data for proactive insider threat detection. β€’ Monitor cyber activity trends and assess risks to confidentiality, availability, and integrity. β€’ Assist with SOP development and deliver clear, insightful briefings and reports to leadership. Required Qualifications: β€’ Bachelor’s degree in Cybersecurity, IT, Computer Science, or related field plus 7+ years relevant experience. β€’ Proven experience deploying and managing User Activity Monitoring solutions in production. β€’ Expertise in Splunk dashboard design, data ingestion, and search optimization. β€’ Hands-on skills with Ansible, Python, and JSON for automation. β€’ Strong understanding of networking, Palo Alto firewalls, endpoint monitoring, SIEM/SOAR integrations, and identity-based risk scoring. β€’ Experience working in classified environments and delivering briefings in SCIF settings. β€’ Knowledge of NIST 800-53 controls and insider threat programs. β€’ Ability to obtain and maintain Public Trust clearance. β€’ Strong analytical, communication, and problem-solving skills. Highly Desired: β€’ Security certifications such as CISSP, CISM, CEH, or CompTIA Security+. β€’ Familiarity with federal cybersecurity regulatory requirements and compliance. β€’ Experience with behavioral analytics, DLP, EDR platforms. β€’ Programming and automation expertise. Note: This position requires working onsite at Woodlawn, MD. If you are a cybersecurity professional passionate about insider threat detection and ready to make an impact in a critical federal environment, apply today. Join us to engineer the future of insider threat defense! #CyberSecurity #Splunk #InsiderThreat #Automation #WoodlawnMD #CyberEngineer #PublicTrust This job post captures the key skills and responsibilities from the detailed JD in a concise, engaging format for LinkedIn recruitment.