Junior Security Operations Engineer

ProsyncAtlanta, GA
Onsite

About The Position

The Junior Security Operations Engineer will support enterprise cybersecurity operations working with SMEs managing Splunk, Cribl and Armis. This role focuses heavily on supporting Splunk and associated security tooling to enhance visibility, detect threats, and support compliance and incident response activities across primarily on premise and Cloud environments.

Requirements

  • A minimum of 1 year of foundational experience supporting SIEM platforms, particularly Splunk and Armis.
  • Experience analyzing logs and security events across enterprise environments.
  • Working knowledge of Windows and Linux systems from a security or operational perspective.
  • Ability to troubleshoot log ingestion, system connectivity, and tool performance issues.
  • Strong analytical, documentation, communication, and collaboration skills.
  • An active Public Trust clearance is required in order to qualify.
  • A Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or similar area of study or equivalent practical experience.
  • Any Splunk certification is required.

Nice To Haves

  • A Master's in Cybersecurity, Computer Science, Information Technology, or similar area of study.
  • Exposure to Whitehouse mandates e.g. M-21-31 or similar compliance and security frameworks.
  • Experience with SIEM engineering, tuning, or data source onboarding.
  • Familiarity with tool integrations (e.g., Armis, Cribl).
  • Basic scripting (python, PowerShell, nix shell) or automation experience to support log handling or troubleshooting.
  • Cribl training or experience.
  • Armis training or experience.
  • Security+ or other foundational security certifications.
  • Cloud (Azure and AWS) knowledge (training and/or certifications).

Responsibilities

  • Support and maintain Splunk for log ingestion, search, and security analysis etc.
  • Working in tandem with TMI team to support M-21-31 mandate.
  • Assist with onboarding, integrating, and validating data sources into SIEM platforms.
  • Support Armis for asset visibility and security monitoring.
  • Support Cribl for log routing, transformation, and pipeline optimization.
  • Ensure reliable log ingestion and data flow into centralized security systems.
  • Analyze logs from Windows, Linux, network, and enterprise systems.
  • Understand log sources and their relevance to security investigations.
  • Ensure logs are centralized, searchable, and investigation ready.
  • Troubleshoot missing, delayed, or malformed log data.
  • Troubleshoot SIEM platforms and supporting infrastructure.
  • Assist internal teams with security related technical issues.
  • Resolve issues related to log ingestion, connectivity, and performance.
  • Troubleshoot Splunk Universal Forwarders, resolve issues on Windows and Linux platforms.
  • Develop understanding of enterprise infrastructure, architecture, and data flows.
  • Understand how logs are generated and consumed by various platforms.
  • Understand interactions between systems and security tools.
  • Work on site full time initially for hands on exposure and collaboration.
  • Support on prem systems and infrastructure as needed.
  • Work directly with engineers, admins, and stakeholders to resolve issues.

Benefits

  • Bonuses that are awarded quarterly
  • Highly competitive compensation rates
  • Comprehensive Health Benefits package
  • 401K Retirement plan
  • Employee assistance program
  • Company-sponsored continuing education program
  • Generous Paid Time Off
  • 11 paid holidays a year
  • Flexible work options
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service