Job Description
Overview DEVOPS/SYSTEMS SECURITY ENGINEER (CORPIT) Bowhead seeks a motivated DevOps/Systems Security Engineer to serve as the primary Splunk engineer in support of the Naval Surface Warfare Center, Dahlgren Division (NSWCDD). This position will play a central role in developing, managing, and optimizing the command's Splunk environment - establishing administrative governance, improving data visibility, and ensuring the platform aligns with DoD cybersecurity and RMF requirements. The ideal candidate will possess a strong foundation in Splunk administration and security operations, complemented by experience with DoD Risk Management Framework (RMF), aptitude in application-layer security and a collaborative, learning-driven mindset. Responsibilities Serve as the primary point of contact for the NSWCDD's Splunk environment. Establish and maintain administrative governance across multiple Splunk instances (e.g., data onboarding, index management, role-based access, and dashboard development). Collaborate with cross-functional teams to define Splunk data ingestion priorities and ensure log sources align with mission and compliance objectives. Lead initiatives to improve Splunk performance, health monitoring, and data integrity across the hybrid (on-prem and cloud) enterprise. Partner with developers and system owners to integrate security telemetry from applications, containers, and cloud workloads into Splunk. Create and maintain dashboards, alerts, and reports to improve situational awareness and decision-making across the Cloud Group. Contribute to developing the long-term Splunk strategy and serve as the POC for all Splunk-related activities across NSWCDD. Apply DoD Risk Management Framework (RMF) principles to ensure Splunk aligns with accreditation and compliance requirements. Support application-layer and DevSecOps security efforts, including scanning and monitoring activities related to code, APIs, or containers. Qualifications High School Diploma or Bachelor's degree required and at least five (5+) or more years of relavent expereince. DOD 8570 IAT level II certification is required (i.e., CompTIA Security+ce). Hands-on experience administering Splunk Enterprise or Splunk Cloud environments (indexers, search heads, data inputs, user/role management). Knowledge of SIEM concepts, log management, and correlation rule creation. Familiarity with DoD cybersecurity frameworks, particularly RMF and STIG compliance. Understanding of application-layer security concepts, including secure coding, API protection, and container security. Ability to troubleshoot and resolve data ingestion, parsing, and performance issues within Splunk. Strong analytical and communication skills; able to convey technical insights to non-technical stakeholders. Motivated self-starter with the ability to work independently while collaborating effectively across teams. Curious and self-driven learner with a passion for mastering SIEM technologies. Abiltiy to serve as the central point of contact for Splunk-related issues ("product owner" mindset). Preferred Qualifications: Experience with Splunk Enterprise Security (ES) or similar security analytics platforms. Familiarity with DevSecOps pipelines and code scanning tools (e.g., Fortify, SonarQube). Experience integrating cloud-native telemetry from AWS, Azure, or hybrid environments. Physical Demands: Must be able to lift up to 10 pounds Must be able to stand and walk for prolonged amounts of time Must be able to twist, bend and squat periodically SECURITY CLEARANCE REQUIREMENTS: Must currently hold a security clearance at the Top Secret level. US Citizenship is a requirement for Top Secret clearance at this location.