MoveTheWorldForwardTogether

When you join Verizon

Verizon is one of the world’s leading providers of technology and communications services, transforming the way we connect across the globe. We’re a diverse network of people driven by our shared ambition to shape a better future. Here, we have the ability to learn and grow at the speed of technology, and the space to create within every role. Together, we are moving the world forward – and you can too. Dream it. Build it. Do it here.

What you’ll be doing...

The Verizon Corporate Information Security (CIS) organization securely enables the business by protecting assets and information across Verizon networks, infrastructure and applications. CIS integrates cybersecurity governance, policies, technologies and operations across Verizon, and works to incorporate security into the design of technology systems and services.

The Security Event Services (SES) team provides enterprise-wide logging services under the direction of Corporate Information Security (CIS). SES is responsible for collecting, processing, storing, and sharing large volumes of data from corporate information assets. Our principal partners are Security and Operations, who use our service to develop information for making decisions to protect and enable the business.

The SES team provides leadership for the design, engineering and implementation of security event data collection related to Incident Response, Threat Monitoring, Threat Intelligence, and Operations. These programs pertain to the data identification, assessment, ingestion, normalization and enrichment activities necessary for our security operations centers to execute proper detection and analytics of threats and response.

The CIS Data Management and Protection directorate is developing a new data-broker/pre-ingestion service to optimize how data is collected, processed, and delivered to downstream security workflows.

  • Perform system administration tasks to leverage new broker services to optimize enterprise logging and SIEM workflows.
  • Manage enterprise logging infrastructures enabling mission critical security workflows.
  • Deploy and manage Splunk application services across AWS and on premise data center networks.
  • Perform Splunk application systems administration.
  • Perform other systems administration tasks including systems monitoring, troubleshooting, and configuration management.
  • Develop and maintain technical infrastructure and workflow documentation. Manage task and project documentation using Jira, Confluence, and other workflow tools.
  • Develop test plans, document change control proposals, and deploy configuration changes via Git, Jenkins, Ansible, and other workflow orchestration tools.
  • Document and share recommendations with peers and leadership teams.
  • Identify, troubleshoot, and resolve service interruptions affecting data brokering and enterprise security logging platforms.

Where you’ll be working:

In this remote role, you'll work from home with occasional in-person training and meetings.

What we’re looking for...

You’ll need to have:

  • Bachelor’s degree or four or more years of work experience.
  • Four or more years of relevant work experience.
  • Experience within IT operations, application and/or infrastructure support.
  • Experience working with Splunk in an enterprise environment.

Even better if you have:

  • Ability to work together with senior technical staff to clearly define/understand strategic goals and identify technologies which can be leveraged to provide solutions.
  • Strong documentation and communication skills.
  • Technical knowledge and skills related to security infrastructures, Unix/Windows systems administration, data collection and monitoring technologies, and Splunk application services.
  • Demonstrable working knowledge of Splunk logging platform infrastructure and data ingestion workflows.
  • Ability to work with minimal supervision.
  • Ability to prioritize tasks and complete goals independently or via self-directed collaboration with peers.
  • Experience with monitoring, detecting, and responding to technical conditions affecting service quality.
  • Ability to independently research technical documentation needed to troubleshoot and resolve project and task objectives.
  • Comprehensive knowledge of common information technology topics including IP networking and UNIX and Windows systems administration.
  • Experience managing enterprise Splunk and large-scale logging and data collection technologies.
  • Experience developing and optimizing Splunk Search Processing Language (SPL).
  • Knowledge of regular expressions and shell scripting.
  • Knowledge of common network security concepts including firewalls and identity and access management.
  • Ability to evaluate technical and administrative conditions to manage priorities.
  • Demonstrate effective verbal and written communication skills.
  • Ability to work independently and also with a team to complete tasks and projects. CISSP, Splunk or other related certifications or willingness to obtain within 12 months of hire.

22CyberOPS

Equal Employment Opportunity

We're proud to be an equal opportunity employer - and celebrate our employees' differences, including race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, and Veteran status. At Verizon, we know that diversity makes us stronger. We are committed to a collaborative, inclusive environment that encourages authenticity and fosters a sense of belonging. We strive for everyone to feel valued, connected, and empowered to reach their potential and contribute their best. Check out our diversity and inclusion page to learn more.

COVID-19 Vaccination Requirement

Verizon requires new hires to be fully vaccinated against COVID-19. Verizon provides reasonable accommodations consistent with legal requirements (e.g., for medical or religious reasons).