Post Job Free
Sign in

Sr Splunk UBA Engineer - ONSITE

Company:
Simple Solutions
Location:
Miami, FL, 33101
Pay:
130USD - 150USD per hour
Posted:
May 24, 2025
Apply

Description:

Job Description

Job Title: Splunk UBA Engineer

3-6 months

onsite - St, Doral, FL 33172, USA

*** MUST HAVE SECRET CLEARANCE***

We are seeking an experienced and analytical Splunk UBA Engineer to implement, optimize, and maintain our User Behavior Analytics (UBA) platform. In this role, you will use behavioral modeling and machine learning capabilities in Splunk UBA to identify insider threats, compromised accounts, data exfiltration, and other advanced attack techniques. You will work closely with SOC analysts, engineers, and data owners to turn user activity data into actionable intelligence and risk-based threat detections.

Key Responsibilities • Deploy, configure, and maintain the Splunk UBA platform, including data ingestion, normalization, and threat model tuning.

• Deploy UBA cluster designing the build

• Ingest and map logs from various sources (e.g., Active Directory, VPN, firewalls, proxy, endpoint, etc.) into UBA.

• Develop and refine behavioral baselines and anomaly detection models to identify suspicious or malicious activity.

• Tune and customize threat models to align with organizational risks and reduce false positives.

• Collaborate with the SOC and threat detection teams to operationalize UBA detectionsthrough risk scoring, notable events, and incident response workflows.

• Build and maintain dashboards, entity timelines, and investigative tools within UBA to support threat hunting and investigations.

• Integrate UBA output with Splunk Enterprise Security (ES) or SOAR platforms for automated response and triage.

• Continuously evaluate new data sources, use cases, and detection strategies to enhance UBA capabilities.

• Document procedures, configurations, and threat model customizations.

Qualifications

Required: • 2–4 years of experience in security engineering, threat detection, or security analytics.

• Hands-on experience with Splunk UBA and a strong understanding of behavior-based threat detection.

• Proficiency in log analysis and understanding of common data sources (AD, EDR, firewalls, VPN, etc.).

• Knowledge of machine learning basics, anomaly detection, and risk-based scoring concepts.

• Strong grasp of attack vectors such as lateral movement, privilege escalation, and insider threats.

• Ability to write clear documentation and communicate findings effectively. Preferred:

• Experience with Splunk Enterprise Security (ES) and/or SOAR integrations.

• Familiarity with MITRE ATT&CK and threat detection frameworks.

• Background in scripting (Python, PowerShell) and API-based data integrations.

• Splunk certifications such as Splunk Core Certified Power User or Splunk UBA Certified Admin.

arning-based anomaly detection and predictive analytics.

Full-time

Apply