Splunk Front End Developer #1673116

Network Designs Inc.
1dRemote

About The Position

The Front-End Splunk Developer is responsible for designing, developing, and maintaining intuitive, high-impact Splunk dashboards and visual analytics that transform complex log and security data into actionable insights. This role focuses on front-end Splunk development, including SPL optimization, dashboard design, and user experience, to support security operations, compliance reporting, and executive decision-making. The developer will collaborate closely with SOC analysts, engineers, and stakeholders to deliver role-based visualizations, improve situational awareness, and enhance enterprise monitoring and security visibility across on-premises and cloud environments.

Requirements

  • U.S. Citizenship is required
  • Must be able to obtain a Public Trust clearance.
  • This position is remote with occasional travel to DC, MD, VA, WV, NJ, and OK.
  • Bachelor's degree in Computer Science, Information Systems, Cybersecurity, Engineering, Mathematics, Technology, or a related IT, engineering, math, or science discipline.
  • 6+ years of experience in Splunk development, security analytics, or enterprise monitoring environments.
  • Demonstrated experience delivering front-end Splunk dashboards, visualizations, and user-focused analytics for SOC, engineering, compliance, and executive audiences.
  • One or more industry-recognized certifications required, including: Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Certified Information Systems Auditor (CISA) Certified Ethical Hacker (CEH) Certified Authorization Professional (CAP) CompTIA Security+
  • Advanced proficiency with Splunk Search Processing Language (SPL), including complex searches, joins, lookups, sub-searches, and statistical analysis.
  • Strong experience developing and customizing: Splunk dashboards using Classic XML and Dashboard Studio Interactive forms, tokens, drilldowns, and role-based views
  • Experience with Splunk UI customization, including Simple XML, HTML/CSS, JavaScript, and SplunkJS (as applicable).
  • Ability to optimize dashboards and SPL queries for performance, scalability, and usability.
  • Strong understanding of data visualization principles and best practices.
  • Experience translating complex log and security data into clear, actionable insights and executive-level metrics.
  • Ability to design dashboards aligned to KPIs, SLAs, and operational goals.
  • Experience building dashboards and alerts to support Security monitoring, incident response, and threat detection
  • Working knowledge of: Cyber threats, attack vectors, APTs, and log-based detection SIEM concepts and SOC workflows
  • Understanding of data ingestion, parsing, and field extraction from diverse sources such as Firewalls, IDS/IPS, endpoint tools, cloud platforms (AWS, Azure, GCP), and operating systems
  • Experience applying Splunk CIM data models to support reusable analytics and dashboards.
  • Experience supporting compliance and reporting aligned with NIST, FISMA, FedRAMP, ISO 27001, and DoD STIGs.
  • Ability to develop audit-ready dashboards and reports supporting security assessments and ATO activities.
  • Experience documenting SPL logic, data sources, and dashboard functionality.
  • Proficient in standard and advanced analytical techniques to correlate events, identify trends, and surface anomalies.
  • Ability to troubleshoot dashboard performance, data quality, and visualization issues across complex environments.
  • Apply data-driven analysis to improve monitoring coverage and security visibility.
  • Collaborate with SOC analysts, engineers, auditors, and leadership to gather requirements and deliver effective Splunk solutions.
  • Communicate technical analytics and risk insights clearly to technical and non-technical stakeholders.
  • Provide user training and knowledge transfer on dashboard usage and interpretation.
  • Strong organizational, time-management, and multitasking skills.
  • Highly responsive and customer-focused.
  • Detail-oriented with a strong emphasis on data accuracy and consistency.
  • Ability to work with confidential and proprietary information with discretion.
  • Commitment to staying current with Splunk platform enhancements, visualization capabilities, and security analytics best practices.

Nice To Haves

  • Preferred Splunk certifications (Core Certified Power User, Advanced Power User, Enterprise Security)
  • Experience supporting Splunk Enterprise Security (ES), including correlation searches, notable events, and risk-based alerting (preferred).

Responsibilities

  • Architect and implement Splunk dashboards for data-center asset inventory and vulnerability reporting.
  • Build Executive dashboards that filter and highlight critical assets for situational awareness.
  • Normalize dashboard layouts, panels, and visualizations to a consistent styling and naming convention.
  • Optimize searches and SPL queries for performance and scalability.
  • Integrate new data sources and onboard security systems into Splunk.
  • Map CVE and asset owner data into asset-centric dashboards
  • Produce and maintain dashboard documentation: data sources, queries, drill-downs, and user guides.
  • Mentor junior engineers and lead knowledge-transfer sessions.
  • Collaborate with stakeholders to plan new dashboards, define requirements, wireframes, and success metrics

Benefits

  • comprehensive health, dental, vision, pet, and legal insurance
  • 401(k) retirement matching
  • paid leave
  • paid holidays
  • health and wellness programs
  • employer-paid life and disability insurance
  • professional development
  • education benefits
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service