Job Description:
Job Summary:
The Senior Splunk Engineer will be responsible for the design, implementation, administration, and optimization of Splunk Enterprise or Splunk Cloud within a large-scale enterprise or managed services environment. The engineer will support log onboarding, correlation rule development, dashboard creation, and performance tuning, ensuring the Splunk platform delivers accurate, actionable insights for security operations and compliance monitoring.
Key Responsibilities:
- Design and implement end-to-end Splunk solutions including data ingestion, parsing, indexing, and search optimization.
- Develop and maintain custom correlation rules, alerts, dashboards, and visualizations to support security monitoring and incident response.
- Onboard new log sources from infrastructure, security, application, and cloud systems using best practices (e.g., via UF, HF, syslog, APIs).
- Perform regular health checks, indexer and search head performance tuning, license usage monitoring, and configuration backups.
- Support threat detection initiatives by translating security use cases into actionable Splunk queries and alerts.
- Assist in troubleshooting ingestion failures, parsing errors, and inefficient searches.
- Collaborate with SOC, threat intelligence, and infrastructure teams to ensure data relevance, completeness, and quality.
- Maintain Splunk Enterprise Security (ES) configurations, including CIM compliance, notables, and risk-based alerting (RBA).
- Implement and manage data retention policies and storage utilization in line with compliance requirements.
- Automate tasks and processes using scripts (Python, Bash, PowerShell) and configuration management tools where needed.
- Provide technical guidance and mentoring to junior Splunk engineers and analysts.
Required Skills & Experience:
- 5+ years of hands-on experience in SIEM engineering with at least 3 years focused on Splunk Enterprise or Splunk Cloud.
- Proficient in SPL (Search Processing Language), data onboarding, and CIM normalization.
- Experience integrating diverse log sources including firewalls, endpoints, cloud (AWS, Azure), identity systems, and threat intel feeds.
- Strong understanding of security operations, detection engineering, and incident response workflows.
- Familiarity with Splunk ES, UBA, ITSI, and SOAR (preferred but not mandatory).
- Experience with scripting and automation (Python, Bash, PowerShell).
- Good knowledge of networking, security protocols, and system administration (Windows/Linux).
At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.
Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here.