Splunk Architect / SOC Analyst

Reposted 18 Days Ago
Be an Early Applicant
Fort Meade, MD
In-Office
200K-250K Annually
Expert/Leader
Other
The Role
The Malware Reverse Engineer analyzes and develops tools against malware, bridging offensive and defensive cybersecurity efforts, and collaborates with teams to strengthen operations.
Summary Generated by Built In
Splunk Architect / SOC Analyst 
Location: Fort Meade, MD | Type: Full-Time | Clearance: TS/SCI CI polygraph required
Overview

We are seeking a Splunk Architect / SOC Analyst who can operate at the intersection of security engineering, threat analysis, and defensive operations. This role requires someone capable of designing and maintaining log and telemetry pipelines, leading investigations, and contributing to policy shaping based on real-world security findings. The ideal candidate brings a balanced combination of red-team awareness, blue-team defensive skill, and purple-team communication, enabling them to understand attacker behavior, detect malicious activity, and strengthen enterprise defenses. This is a hands-on, on-site role that requires strong technical fundamentals and the ability to explain and defend security decisions.
Key Responsibilities:

Security Engineering
  • Administer and optimize SIEM ingestion pipelines, data parsing, forwarders, and indexing.

  • Develop high-fidelity searches, dashboards, correlation rules, and alerting logic.

  • Maintain log source integrity and ensure reliable telemetry across the environment.

  • Collaborate with incident responders, system administrators, and leadership to improve visibility.

Threat Analysis & SOC Operations
  • Monitor, triage, and investigate alerts across multiple data sources.

  • Conduct root-cause analysis and produce clear documentation of findings.

  • Improve detection logic through continuous tuning and behavior-based modeling.

  • Identify gaps in monitoring, detection coverage, or system hardening.

Threat Hunting
  • Lead proactive hunts based on threat intelligence, observed behaviors, or hypotheses.

  • Build custom analytic queries to uncover suspicious patterns or attacker tradecraft.

  • Pivot across logs, system data, authentication patterns, and network activity.

  • Provide recommendations to enhance defensive posture.

Red / Blue / Purple Team Awareness
  • Apply an attacker mindset to anticipate exploitation paths and identify blind spots.

  • Evaluate how techniques such as lateral movement, privilege escalation, and persistence appear in logs.

  • Communicate effectively with offensive and defensive stakeholders to close detection gaps.

Operating System & Infrastructure Understanding
  • Explain how Linux and Windows systems behave during real-world attack sequences.

  • Demonstrate knowledge of processes, logs, services, authentication, and system interactions.

  • Understand VMs (hypervisors, virtual hardware, isolation) and how containers differ.

  • Interpret OS behavior across network layers and packet flow.

Policy Shaping / Risk Awareness
  • Translate technical findings into policy recommendations.

  • Shape detection and response policies based on real attacker behaviors and validated risks.

  • Produce clear guidance for leadership without oversimplifying technical concepts.

Minimum Qualifications

Clearance: Active TS/SCI with CI Polygraph

Foundational Splunk Knowledge

  • Ability to administer and maintain indexes, inputs, parsing, and forwarders.

  • Proficiency in SPL for searches, dashboards, alerts, and investigations.

  • Ability to diagnose ingestion, parsing, and data quality issues.

SOC & Detection Experience

  • Experience with log analysis, incident triage, and security investigations.

  • Ability to identify malicious behavior in authentication logs, endpoints, and network flow.

  • Familiarity with intrusion analysis and attacker behavior mapping.

Threat Hunting Competency

  • Hypothesis-driven methodology.

  • Ability to identify weak signals of compromise.

  • Understanding of attack chains and detection points.

Red/Blue/Purple Mindset

  • Ability to speak confidently about offensive techniques.

  • Understanding of how attacker actions appear in defensive telemetry.

  • Comfortable collaborating across disciplines.

OS + Virtualization Fundamentals

  • Strong grounding in Linux and Windows internals, logging, and services.

  • Ability to explain OS behavior during network, authentication, and system events.

  • Understanding of virtual machines, hypervisors, and container architectures.

Analytical & Communication Skills

  • Ability to write clear, concise summaries of investigations.

  • Skill in translating technical findings into actionable recommendations.

  • Ability to shape policy based on observed risks.

Desired Qualifications
  • Experience in a SOC, security engineering team, or threat hunting role.

  • Familiarity with scripting or automation (PowerShell, Bash, Python).

  • Experience with large enterprise or government environments.

  • Ability to explain complex security concepts to leadership.

Compensation & Benefits

Salary Range: $200,000 – $250,000 annually
Final compensation will depend on experience, qualifications, internal equity, and market data. DarkStar provides a competitive and comprehensive benefits package for full-time employees.

Additional Details

Travel: Minimal
Work Environment: On-site at Fort Meade, MD

Security Note

All applicants must be U.S. citizens and maintain eligibility for a U.S. government security clearance.

Top Skills

Assembly
C
C++
Go
Rust
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: Alexandria, VA
66 Employees
Year Founded: 2015

What We Do

DarkStar Intelligence is a Service Disabled Veteran-Owned Small Business that offers advanced intelligence-based solutions to clients in the private and public sector. Our capabilities and personnel provide unique advantages to our customers.

Similar Jobs

Hybrid
3 Locations
213000 Employees
26-34 Hourly
Hybrid
5 Locations
213000 Employees
26-34 Hourly

Wells Fargo Logo Wells Fargo

Senior Premier Banker

Fintech • Financial Services
Hybrid
12 Locations
213000 Employees
34-66 Hourly

Wells Fargo Logo Wells Fargo

Senior Premier Banker

Fintech • Financial Services
Hybrid
12 Locations
213000 Employees
34-66 Hourly

Similar Companies Hiring

Spark Advisors Thumbnail
Software • Sales • Other • Insurance • Healthtech
New York, NY
110 Employees
Cox Enterprises Thumbnail
Software • Other • Information Technology • Greentech • Cybersecurity • Cloud • Automotive
Atlanta, GA
50000 Employees
Compa Thumbnail
Software • Other • HR Tech • Business Intelligence • Artificial Intelligence
Irvine, CA
60 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account