Lead Splunk Engineer

Location: Melbourne
Job Type: Permanent
Reference: JO-1911-13326
Salary: Competitive annual salary + bonus
Contact Name: Megan Luttrell
Contact Email: mluttrell@launchrecruitment.com.au
We are partnering with one of our Telco clients to secure a Lead Splunk Engineer who will fill a senior role through their technical leadership on a permanent basis.

Your new role:

This role will see you move into a technical leadership position sitting across a team that deliver across the organisation. The deliverables include:
  • Onboarding of critical event / log data through modelling (CIM)
  • Delivery of dashboards / reporting to support the ongoing and future security needs of the organisation
  • Logging types and data sources into the SIEM tool by identifying, developing and deploying global cybersecurity controls across the enterprise leveraging the firm’s assets, network and data to identify threats
  • Partnering heavily with Cyber Security Operation Centre (CSOC) along with other areas of the organisation to support the end to end secure deployment of security technologies across the enterprise

Your day to day responsibilities:
  • People Management
    • Provide technical support to immediate team and wider community on platform
    • Mentor and support engineers
  • Build & Deploy Agreed Solutions
    • Technical design within the local domain
    • Proactively participate in estimation and program planning
    • Design, build, test and deploy that meet business outcomes that also consider features, cost and quality
  • Support Operational Health
    • All delivery activity aligned with standards to drive quality engineering
    • Foster sound working relationships with Operations adopting a 1 Team ethos
  • Drive continuous Improvement

Your background, skills and experience:

In order to be successful in this role, you will have proven leadership and sound technical expertise on the Splunk. This will cover areas such as:
  • Solution Design / Architecture
  • Enterprise Security
  • User Behavioural Analytics
  • Splunk Applications
  • Data sources for complex Splunk environments
You will also have:
  • Solid understanding of Security information and event management (SIEM)
  • Experience in delivering services into a SIEM with the Splunk toolset
  • A background in networking, security, and infrastructure monitoring using the Splunk toolset

Sounds like you? What next?

Apply now with your CV in Word format and I will get back to you ASAP!