What are the responsibilities and job description for the Sr. SOC Engineer (Splunk ES & SOAR) position at Software Guidance & Assistance, Inc. (SGA, Inc.)?
Software Guidance & Assistance, Inc., (SGA), is searching for an Sr. SOC Engineering Consultant for a CONTRACT assignment with one of our premier Regulatory clients in Rockville, MD or Tysons, VA.
Hybrid - 3x a week on-site
About The Role
SGA is an Equal Opportunity Employer and does not discriminate on the basis of Race, Color, Sex, Sexual Orientation, Gender Identity, Religion, National Origin, Disability, Veteran Status, Age, Marital Status, Pregnancy, Genetic Information, or Other Legally Protected Status. We are committed to providing access, equal opportunity, and reasonable accommodation for individuals with disabilities in employment, and our services, programs, and activities. Please visit our company EEO page to request an accommodation or assistance regarding our policy.
Hybrid - 3x a week on-site
About The Role
- Our Security Operations Center is evolving from foundational capabilities into a mature, comprehensive security operations program. We need an experienced SOC engineer who has been part of a top-tier SOC and can provide technical vision and leadership to guide our detection engineering and automation efforts.
- This role focuses on building robust detection capabilities, automating security responses, and creating frameworks that enable our SOC analysts to effectively identify and respond to threats. You will work closely with our threat intelligence and hunting teams to translate security research into actionable detections and automated responses.
- This position reports to the Director of Security Platform Engineering and serves as a senior individual contributor with potential to transition into a technical lead role as the SOC engineering team expands. You will collaborate closely with SOC analysts, threat intelligence teams, threat hunters, and platform engineering teams.
- The role offers the opportunity to shape SOC capabilities, establish engineering standards, and build a world-class detection and response program using industry-leading tools. This is a senior-level position requiring demonstrated experience in mature SOC environments and the ability to provide technical vision and mentorship.
- Design and implement comprehensive detection use cases aligned with the MITRE ATT&CK framework
- Conduct gap analysis of current detection coverage and develop roadmap to address gaps
- Build and tune correlation searches, alerts, and detection logic in Splunk Enterprise Security
- Implement Risk-Based Alerting (RBA) methodologies to improve signal-to-noise ratio
- Develop detection strategies for multi-cloud environments (AWS, GCP, Azure)
- Continuously evaluate and improve detection effectiveness based on SOC feedback
- Design and implement automated response playbooks using Splunk SOAR
- Build integrations between security tools to enable automated investigation and response workflows
- Develop scripts and automation (Python, Bash, PowerShell) to streamline SOC operations
- Create reusable automation frameworks that scale across multiple use cases
- Collaborate with platform engineering to ensure reliable automation infrastructure
- Define what a mature SOC capability looks like using Splunk ES, SOAR, and supporting tools
- Identify gaps and shortcomings in current SOC implementation and provide clear remediation guidance
- Establish best practices, standards, and frameworks for detection engineering and response
- Mentor platform engineering team on SOC-specific requirements and approaches
- Contribute to long-term SOC strategy and capability development
- Partner with threat intelligence and threat hunting teams to operationalize research into detections
- Work with SOC analysts to understand investigation workflows and improve detection quality
- Collaborate with platform engineering teams to implement and maintain SOC infrastructure
- Participate in incident response activities to validate and refine detection and automation capabilities
- Document detection logic, playbooks, and technical architectures
- SOC Experience: 5 years in a Security Operations Center environment with exposure to mature SOC operations and best practices
- SIEM Expertise: Hands-on experience with Splunk Enterprise Security or comparable enterprise SIEM platforms (building correlation searches, alerts, dashboards, and ES-specific frameworks)
- Detection Engineering: Proven experience developing security detections, use cases, and alert tuning methodologies
- MITRE ATT&CK Framework: Practical application of MITRE ATT&CK for detection coverage mapping and gap analysis
- Security Automation: Experience building automated response workflows and playbooks (SOAR platforms preferred)
- Scripting: Strong proficiency in Python, PowerShell, or Bash for automation and integration development
- Cloud Security: Understanding of cloud security monitoring and detection across AWS, GCP, and Azure environments
- Analytical Mindset: Ability to identify gaps, define clear vision for improvement, and guide teams toward maturity
- Splunk SOAR (Phantom) hands-on experience
- Splunk UEBA or behavioral analytics platform experience
- Risk-Based Alerting (RBA) implementation experience
- Threat hunting background with detection engineering application
- Infrastructure automation and CI/CD pipeline knowledge
- Experience mentoring or leading detection engineering teams
- Relevant certifications (GIAC, CISSP, or similar)
SGA is an Equal Opportunity Employer and does not discriminate on the basis of Race, Color, Sex, Sexual Orientation, Gender Identity, Religion, National Origin, Disability, Veteran Status, Age, Marital Status, Pregnancy, Genetic Information, or Other Legally Protected Status. We are committed to providing access, equal opportunity, and reasonable accommodation for individuals with disabilities in employment, and our services, programs, and activities. Please visit our company EEO page to request an accommodation or assistance regarding our policy.
Salary : $72 - $80