Splunk Dashboard Engineer #1749928

Network Designs Inc.
Remote

About The Position

The Splunk Dashboard Engineer is responsible for the design, development, and implementation of high-visibility data visualizations that transform complex Continuous Diagnostics and Mitigation (CDM) data into actionable intelligence. This role bridges the gaps between technical security telemetry and system and application teams and executive-level decision-making. You will build dashboards that track compliance against NIST SP 800-53 controls, NIST CSF and NIST RMF frameworks, providing Executives with top-level information needed for decision-making, and System Owners and System and Application Teams with the visibility required to remediate vulnerabilities and bolster the agency's security posture.

Requirements

  • U.S. Citizenship is required
  • Must be able to obtain a Public Trust clearance.
  • This position is remote with occasional travel to DC, MD, VA, WV, NJ, and OK.
  • Bachelor's degree in Computer Science, Information Systems, Cybersecurity, Engineering, Mathematics, Technology, or a related IT, engineering, math, or science discipline.
  • Certifications: Certified Information Systems Security Professional (CISSP) or Certified Information Systems Auditor (CISA), and Splunk Core Certified Power User or Splunk Cloud Certified Administrator.
  • 6+ years of experience in Splunk development, security analytics, or enterprise monitoring environments.
  • Strong understanding of the Splunk Common Information Model (CIM) to ensure disparate data sources are normalized for unified reporting.
  • Demonstrated experience delivering front-end Splunk dashboards, visualizations, and user-focused analytics for SOC, engineering, compliance, and executive audiences.
  • Technical experience leveraging Agile Development practices, Jira, Proficiency in HTML/CSS and JavaScript for advanced dashboard customization and "glass table" views.
  • Deep familiarity with the NIST Risk Management Framework (RMF) and how CDM data supports the "Monitor" step.
  • Prior experience working within a Civilian or Federal CISO office focusing on NIST compliance, vulnerability management, and Security Information and Event Management (SIEM).

Responsibilities

  • Stakeholder Engagement: Conduct requirement-gathering sessions with System Owners, System and Application Teams, and Executives to define Key Performance Indicators (KPIs) and Key Risk Indicators (KRIs).
  • Data Visualization & UX: Design and maintain complex dashboards using Splunk XML (Simple XML), Splunk Search Processing Language (SPL) and Splunk Dashboard Studio to provide real-time visibility into CDM data.
  • Compliance Mapping: Translate NIST control requirements (e.g., AC, AU, CM, SI families) into technical Splunk queries (SPL) to automate compliance reporting.
  • Data Integration: Collaborate with System, Application, and Data Engineers to ensure CDM data feeds (Hardware/Software Asset Management, Vulnerability Management, and Identity Management) are correctly indexed and CIM-compliant.
  • Optimization: Audit and tune existing dashboard queries to ensure high performance, minimal load times, and efficient use of system resources.
  • Training and Demo Sessions: Lead interactive training and demonstration sessions for System Owners, application teams, and executives to facilitate dashboard adoption and secure formal sign-off on visualization requirements and dashboard acceptance.
  • Splunk Front-End Development: Master proficiency with Splunk Search Processing Language (SPL), including writing advanced, optimized queries using transforms like stats, eval, rex, mstats, and tstats for high-speed data retrieval.
  • Strong experience developing and customizing: Splunk dashboards using Classic XML and Dashboard Studio Interactive forms, tokens, drilldowns, and role-based views Ability to optimize dashboards and SPL queries for performance, scalability, and usability.
  • Data Visualization & User Experience: Strong understanding of data visualization principles and best practices.
  • Experience translating complex log and security data into clear, actionable insights and executive-level metrics.
  • Ability to design dashboards aligned to KPIs, SLAs, and operational goals.
  • Security Analytics & SIEM Knowledge: Ability to interpret CDM data models by navigating and utilizing CDM Agency Dashboard data models to ensure consistency with federal reporting standards.
  • Experience performing root cause analysis. Utilizing dashboards to identify security gaps, misconfigurations, or data quality issues within the environment.
  • Strong knowledge of: Cyber threats, attack vectors, APTs, and log-based detection SIEM concepts and SOC workflows
  • Data Onboarding & Normalization: Strong understanding of data ingestion, parsing, and field extraction from diverse sources such as Firewalls, IDS/IPS, endpoint tools, cloud platforms (AWS, Azure, GCP), and operating systems
  • Experience applying Splunk CIM data models to support reusable analytics and dashboards.
  • Experience with automating reporting by developing scheduled reports and PDF delivery mechanisms to provide recurring updates for FISMA and NIST audits
  • Governance, Compliance & Reporting: Experience supporting compliance and reporting aligned with NIST, FISMA, FedRAMP, ISO 27001, and DoD STIGs.
  • Ability to develop audit-ready dashboards and reports supporting security assessments and ATO activities.
  • Experience documenting SPL logic, data sources, and dashboard functionality.
  • Analytical & Problem-Solving Skills: Proficient in standard and advanced analytical techniques to correlate events, identify trends, and surface anomalies.
  • Ability to troubleshoot dashboard performance, data quality, and visualization issues across complex environments.
  • Apply data-driven analysis to improve monitoring coverage and security visibility.
  • Collaboration, Communication, and Professional Attributes: Strong ability to communicate technically and strategically; explain complex "broken" security controls to technical teams while summarizing the "so what" for executive leadership.
  • Collaborate with SOC analysts, engineers, auditors, and leadership to gather requirements and deliver effective Splunk solutions.
  • Strong organizational, time-management, and multitasking skills.
  • Highly responsive and customer-focused.
  • Detail-oriented with a strong emphasis on data accuracy and consistency.
  • Ability to work with confidential and proprietary information with discretion.
  • Commitment to staying current with Splunk platform enhancements, visualization capabilities, and security analytics best practices.

Benefits

  • At NDi, we value our team and are committed to retaining top talent by offering competitive benefits and compensation packages.
  • Our employee benefits package includes comprehensive health, dental, vision, pet, and legal insurance.
  • Our corporate benefits include 401(k) retirement matching, paid leave, paid holidays, and health and wellness programs.
  • In addition, we provide employer-paid life and disability insurance, professional development, education benefits, and much more to ensure our team has the resources they need to thrive on and off the job.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service