Overview:Team SMS is looking for an Enterprise Network Tools Analyst to support our Air Force Intranet Control (AFINC) team at Maxwell Gunter AFB in Montgomery, AL. The AFINC Enterprise Network Analysis Team supports the 26 NOS, who requires services and solutions that accomplish and provide enabling capabilities to operate the DoDIN. These capabilities include, but are not limited to, Distributed Network Connectivity, Continuity of Operations, Information Management and Exchange, Standardization, Risk Management, DoD Enterprise Service Management Framework (DESMF), System Administration, Database Management, Account Management, Asset Management and Network Address Management.
As a dynamic systems integrator, SMS offers proven solutions in engineering, operations, cybersecurity, and digital transformation. With expertise in modernizing and optimizing legacy infrastructure and systems, ensuring operational efficiency, and designing, implementing, and managing secure environments, SMS supports business and mission goals with proficiency, quality, and integrity.
SMS has been serving the advanced information technology needs of the federal government since 1976, delivering talented teams and innovative, cost-effective solutions and services to support our customers’ missions for more than 40 years. SMS is headquartered in McLean, Virginia, with offices and on-site operations at customer locations throughout the United States. For additional information on SMS, visit www.sms.com.
Submit your resume today!
Responsibilities:Duties and Responsibilities:
- Serve as Splunk engineer, senior leader and/or subject matter expert (SME) responsible for planning, designing, and implementing Splunk across multiple enterprise networks cluster implementations
- Assesses current Splunk implementations for each network and recommend changes to distributed deployments to include Indexer Clustering, Search Head Clustering, Forwarders, daily indexing, search volume, number of data sources, number of users, custom apps/dashboards/visualizations
- Monitor, troubleshoot, and analyze overall health of Splunk infrastructure
- Perform root cause analysis, recommend, and implement tactical and strategic solutions to problems
- Develop, update and document Splunk architecture, operational processes, and training materials
- Ability to automate global, multi-site solutions with Ansible, Python, and Bash scripting techniques
- Experience with various log ingestion methods, new data onboarding and related products, such as Log Agents, syslog, DB Connect (dbConnect), Universal Forwarder (UF) Agent, HTTP Event Collector
- Working knowledge of Linux; general networking topics such as SSL, load balancing, routing protocols, firewall rules, and ability to support/interact with McAfee Endpoint Security System (ESS) for RHEL
- Document steps required to design/engineer Splunk systems for each network to include virtual/real IP address, Fully Qualified Domain Name (FQDN), DNS entries, Role Based Access Controls (RBAC), service accounts, web certificates, licenses and physical/virtual location of each component
- Candidate will oversee activities to include planning, researching, deploying, monitoring, upgrading, patching, and troubleshooting Splunk components spanning a large and complex environment
- Ability to maintain valid system certificates, application certificates, F5 load balancing local traffic management (LTM) and two-factor authentication (2FA) within a smart card environment
- Ability to take bootstrap ideas to polished, efficient dashboard
- Sr Systems Engineer/SME/Architect/Developer provides tech support in system architecture, system design, system integration & technical management
- Review existing data models with special attention to the following data models, Identity Management Authentication, Malware, Endpoint, Network, Traffic, Risk, Threat Intelligence, among other data models/deprecated models.
- Provide best practice recommendations: how to update/maintain/add new Data Models; Data Model Creation/Acceleration/Maintenance; Risk Based Alerting; Scaling of Correlation Searches
- Oversee the baseline configuration, fine tuning data models, ensure operational data integrity, and using vendor best practices for the Splunk systems and secure management across multiple unclassified and classified network locations supporting the interaction with Tenable products within Assured Compliance Assessment Solution (ACAS) including .SC (SecurityCenter™) and Nessus® Scanner™
- Ability or experience in evaluating scan report data from Tenable Nessus; participate in the review and response phases of the Vulnerability Management (VM) life cycle
- Install and patch operating systems, applications, and document Department Information Systems Agency (DISA) Security Technical Implementation Guidelines (STIGs) checklists applicable to each Non-classified or Secret Internet Protocol (IP) Router Network (NIPRNet, SIPRNet) network environment for all Splunk implementations
- Assist in the Splunk system installation/maintenance of configuration files, custom security policies
- Manage or assist the processes related to onboarding users/projects, configuration audits, building data models, summary data reports, basic Search Processing Language (SPL), advanced search analytics
- Ability to create Splunk network designs diagrams with Microsoft Visio (include specialty requirements)
- Implement/create report dashboard designs, automated custom email report notifications, report log data repositories for each environment that are specific to the following audiences: Leadership & Executives; Cybersecurity Staff; and System Administrators
- Ensures networks receive periodic updates from AFCYBER-released software patches, updates, and upgrades via Time Compliance Technical Orders (TCTO), Time Compliance Network Orders (TCNO), Maintenance Tasking Order (MTO) and Notices to Airman (NOTAMs)
- Assist AF Cyber personnel with the DISA Information Assurance Vulnerability Management (IAVM) programs, cybersecurity toolsets, and Operation Order (OPORD)/Fragmentary Order (FRAGO) support
- Ensures external networks receive inventory data for compliance data DoD Enterprise Logging Ingest, NiFi, and Cyber Situational Awareness Refinery (ELICSAR) Big Data Platform (BDP)
- Communicate, manage expectations, eliminate gaps and successfully interact with multiple external and internal 26th NOS team leads, administrators, analysts, users, customers, system owners and management
- Guide customers in the use of strategic products through education and guidance, first-use and tuning assistance problem solving and critical situation resolution.
- Candidate will be a part of the 26th NOS Enterprise Networking Application Tools (ENAT) team which will be small but highly visible so experience in at least one of the other monitoring platforms or enterprise tools is helpful if not critical (SolarWinds Orion, CA’s NetQoS NetFlow Analysis, Cacti, F5 Big-IP Appliance)
- Candidate will report to the 26th NOS Systems Administration (SA) team leadership
Qualifications:
*
Qualifications/Requirements*:
- SrSA/Engineer/SME/Architect/Developer candidate must have a minimum of 6+ years of Splunk products experience and/or enterprise monitoring tools experience interacting with 3rd party systems preferably in role(s) such as a system administrator, engineer, developer or architect capacity
- Splunk experience with design, implementation and administration in a large-scale environment preferably overseeing daily, weekly, monthly functions and best practices
- Identify, analyze, define, & coordinate user, client, and stakeholder needs and translate them into technical requirements
- Support day-to-day technical communication systems and incident tickets in support of operations
- Candidate should have 4+ years of years of hands-on experience in:
- System Integrator and/or administrator for Splunk users, searches/reports, dashboards, systems or 3rd party onboarding log data
- Windows OS, UNIX or Linux-based systems support with experience in mid-to-large data center environments and patch/update management
- Demonstrated advanced diagnostics, analytical, troubleshooting skills
- Preferred system hardening experience
- Strongly preferred Splunk Enterprise Security experience
- Perform systems analysis, design review, integration of complex system applications
- Experience with disaster recovery (DR) - expertise in risk reduction, hot/warm site DR architecture
- Experience with physical servers and within virtualized environments such as VMware vSphere’s vCenter Server Appliance, ESXi hosts, virtual machines (VMs), SAN datastores, host bus adapters (HBA) fiber connectivity, and/or VM/Host distributed resource schedules (DRS) groups/rules
- Scripting experience with regular expressions and languages such as: Ansible, Bash, JavaScript, HTML, Perl, PowerShell, or Python
- Knowledge of data communications, local-area networking (LAN), wide-area networking (WAN), servers, routers, switches, and firewalls
- Network (Layer 2, 3) LAN/WAN knowledge and switches/routers
- Thorough understanding of Internet Protocol (IP) routing, switching, and OSI model
*
Competencies:*
- Possess refined critical thinking skills, should be a motivated self-starter, and multi-task capable
- Ability to follow policies and procedures
- Approach work tasks as diplomatic, adaptive to a dynamic environment, dependable and reliable
- Good communication and interpersonal skills; Strong written and oral communication skills
- Ability to communicate in a clear speaking voice as well as the ability to respond clearly to questions
- Aptitude to address negative situations and resolve them in a positive manner
- Ability to deal with conflicts with your peers and users
- Assist and mentor other engineers or administrators with various Splunk related activities
- Jump right in and start building
- Ability to lift, rack and provision government furnished equipment (GFE) servers
*
Education*:
- Associate or Bachelor’s degree in Computer Science or related technical discipline, or MIS related field is preferred but not mandatory. Relevant professional experience is acceptable.
- Splunk courses desired: Splunk Fundamentals 1, 2 or 3; Splunk Create Dashboards; Splunk Advanced* Search/Report; Splunk Data Administration; Splunk System Administration; Splunk Enterprise Cluster Administration; Splunk Enterprise Troubleshooting; Splunk Advanced Dashboards/Visuals*;
*
Required Certification*:
- CompTIA Security+ ce (continuing education) or (ISC)² CISSP
- One Operating System Certification: CompTIA Linux+; Microsoft Technology Associate (MTA)
- One Application Certification: Splunk Core Certified User; Splunk Core Certified Power User; Splunk Core Certified Advanced Power User; Splunk Enterprise Certified Admin; Splunk Enterprise Certified Architect; Splunk Certified Developer; Splunk Enterprise Security Certified Admin; Splunk IT Service Intelligence Certified Admin
*
Desired Certification(s)*:
- CompTIA Linux+ or equivalent;
- Splunk Core Certified Advanced Power User;
- Splunk Enterprise Certified Admin or Splunk Enterprise Security Certified Admin;
- Splunk Enterprise Certified Architect or Splunk Certified Developer;
*
Clearance*:
Active DoD Secret required with ability to upgrade to Top Secret clearance preferred
Location: 10 N Pine Street, Montgomery, AL 36113
Job Type: Full-time