Search

Splunk Systems Administrator

CSA Global LLC
locationPensacola, FL, USA
PublishedPublished: 5/5/2026
Full Time
Description:

CSA is looking for a Splunk Systems Administrator in Pensacola, FL to support and enhance our Splunk environment with a strong emphasis on Zero Trust architecture and secure system design. This role requires deep technical expertise in data systems, cybersecurity practices, and secure system administration within classified and unclassified environments. The ideal candidate will play a critical role in advancing our organization’s Zero Trust maturity by leveraging Splunk as a central security analytics and monitoring platform.


For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions.


How Your Role Will Make an Impact:

  • Administer and maintain Splunk Enterprise deployments across classified and unclassified environments, ensuring high availability, performance, and security.
  • Architect and implement Splunk solutions that support Zero Trust principles, including continuous monitoring, least privilege access, and micro-segmentation visibility.
  • Integrate diverse log sources (endpoints, network devices, identity systems, cloud services) to enable comprehensive visibility aligned with Zero Trust architecture.
  • Develop and optimize correlation searches, alerts, and dashboards to detect anomalous behavior, insider threats, and policy violations.
  • Support implementation of Zero Trust frameworks by enabling telemetry for identity, device posture, and access control validation.
  • Manage and enhance services within Splunk IT Service Intelligence (ITSI) to align operational intelligence with security posture.
  • Collaborate with cybersecurity teams to map Splunk capabilities to frameworks such as NIST 800-207 (Zero Trust Architecture).
  • Provide advanced support to Splunk users, including search development, data onboarding, and dashboard creation for security and operational use cases.
  • Harden and secure Linux-based systems in accordance with DISA STIGs and organizational security policies.
  • Automate system administration, data ingestion, and security workflows using scripting languages such as Python, Bash, or PowerShell.
  • Participate in incident response and threat hunting activities using Splunk as a primary investigative tool.
Requirements:

What You Will Need to Join Our Award-Winning Team:

  • Clearance: Must possess and maintain an active Secret Clearance or have the ability to obtain and maintain one.
  • Certification: CompTIA Security+ (Sec+) or qualifying Bachelor’s degree in a related field and meet U.S. Navy Cybersecurity Workforce (CSWF) requirements.
  • Minimum of 6+ years of experience in systems administration, including implementation of DISA STIGs.
  • Hands-on experience administering Splunk Enterprise in distributed environments (indexers, search heads, forwarders).
  • Familiarity with Zero Trust concepts, such as identity-centric security, continuous verification, and least privilege access.
  • Experience onboarding and normalizing logs from multiple data sources (e.g., Active Directory, firewalls, EDR tools, cloud platforms).
  • Experience with automation and scripting (Python, Bash, or PowerShell).
  • Working knowledge of Linux system administration and security hardening.

Preferred Qualifications:

  • Experience implementing or supporting Zero Trust Architecture (ZTA) in a DoD or federal environment.
  • Familiarity with frameworks such as NIST 800-207, RMF, and MITRE ATT&CK.
  • Experience with Splunk Enterprise Security (ES) and/or ITSI.
  • Knowledge of identity and access management (IAM), multi-factor authentication (MFA), and endpoint security integration.
  • Splunk certifications (e.g., Splunk Enterprise Certified Admin, Splunk Core Certified Power User).
  • Experience with cloud platforms (AWS, Azure, or GovCloud) and their integration into Splunk.






PI284325212