Posted in

IT Monitoring Architect

IT Monitoring Architect

CompanyAuto-Owners Insurance
LocationEast Lansing, MI, USA
Salary$Not Provided – $Not Provided
TypeFull-Time
DegreesBachelor’s
Experience LevelMid Level, Senior

Requirements

  • Bachelor’s degree in Computer Science, Computer Engineering, Information Technology, Business Information Systems, Information Systems, or Management Information Systems or a similar major is preferred. Candidates without a four-year degree, but with several years of relevant experience, may also be considered.
  • Advanced knowledge of Splunk architecture, back-end design, and platform optimization for distributed environments. Proficiency in managing Splunk configuration files and operational workflows.
  • Experience with Security Information and Event Management (SIEM) principles, particularly in monitoring, detection, and response, to align monitoring with security objectives.
  • Skilled in systems administration (Windows or *nix), networking fundamentals, and tools like PuTTY, WinSCP, RDP, SSH, SAMB, CIFS, and NFS shares.
  • Familiarity with advanced network configurations, including network tunneling, cloud-to-on-prem integrations, F5 Load Balancing, and Splunk certificate/SSL management for secured forwarding.
  • Strong scripting abilities (Python or similar) and understanding of compliance-related practices such as role-based access control (RBAC) and secure data governance.
  • Hands-on experience with web design basics, CI/CD pipelines (Jenkins), source control tools (Bitbucket/Sourcetree), and automation techniques to streamline monitoring operations.
  • Demonstrated ability to organize and plan project assignments, lead cross-functional initiatives, and align monitoring goals with business needs while managing deliverables and timelines effectively.
  • Excellent communication skills for engaging both in-person and virtual teams.
  • A commitment to working closely with other teams and divisions to foster alignment, share insights, and promote the adoption of best practices throughout the organization.

Responsibilities

  • Analyzing, designing, and optimizing SEIM architecture to ensure scalable, high-performance monitoring systems.
  • Defining and implementing best practices for Splunk development, configuration, and platform operations, ensuring consistency across the organization.
  • Serving as the primary Entitlement Contact for our SEIM product, managing vendor relationships, submitting support cases, and coordinating feature requests, upgrades, and product roadmaps.
  • Leading monitoring system design reviews, directing the analysis, design, and implementation phases, and ensuring alignment with business, security, and operational objectives.
  • Developing and customizing SEIM product apps, dashboards, and advanced visualizations, integrating external systems, and optimizing performance to meet operational and business needs.
  • Providing operational oversight of our SEIM platform maintenance, including syslog ingestion, code releases, server and application layer patching, and user support.
  • Collaborating with internal teams, affiliates, and external partners to align priorities, address advanced networking requirements, and secure seamless integrations across cloud and on-prem environments.
  • Driving cross-departmental initiatives to reduce silos, enhance collaboration, and advance the organization’s monitoring maturity.
  • Leading initiatives to improve security and compliance within monitoring systems, including evaluating role-based access controls (RBAC), data governance practices, and certificate/SSL management for secure forwarding.
  • Collaborating closely with the IT Monitoring team and the broader Monitoring Community to foster alignment, share knowledge, and promote the adoption of best practices across the organization.
  • Maintaining a state-of-the-art awareness of monitoring systems, tools, and data processing techniques, ensuring the organization remains current with emerging technologies.

Preferred Qualifications

  • Bachelor’s degree in Computer Science, Computer Engineering, Information Technology, Business Information Systems, Information Systems, or Management Information Systems or a similar major is preferred. Candidates without a four-year degree, but with several years of relevant experience, may also be considered.
  • Advanced knowledge of Splunk architecture, back-end design, and platform optimization for distributed environments. Proficiency in managing Splunk configuration files and operational workflows.
  • Experience with Security Information and Event Management (SIEM) principles, particularly in monitoring, detection, and response, to align monitoring with security objectives.
  • Skilled in systems administration (Windows or *nix), networking fundamentals, and tools like PuTTY, WinSCP, RDP, SSH, SAMB, CIFS, and NFS shares.
  • Familiarity with advanced network configurations, including network tunneling, cloud-to-on-prem integrations, F5 Load Balancing, and Splunk certificate/SSL management for secured forwarding.
  • Strong scripting abilities (Python or similar) and understanding of compliance-related practices such as role-based access control (RBAC) and secure data governance.
  • Hands-on experience with web design basics, CI/CD pipelines (Jenkins), source control tools (Bitbucket/Sourcetree), and automation techniques to streamline monitoring operations.
  • Demonstrated ability to organize and plan project assignments, lead cross-functional initiatives, and align monitoring goals with business needs while managing deliverables and timelines effectively.
  • Excellent communication skills for engaging both in-person and virtual teams.
  • A commitment to working closely with other teams and divisions to foster alignment, share insights, and promote the adoption of best practices throughout the organization.