IT Monitoring Architect
Company | Auto-Owners Insurance |
---|---|
Location | East Lansing, MI, USA |
Salary | $Not Provided – $Not Provided |
Type | Full-Time |
Degrees | Bachelor’s |
Experience Level | Mid Level, Senior |
Requirements
- Bachelor’s degree in Computer Science, Computer Engineering, Information Technology, Business Information Systems, Information Systems, or Management Information Systems or a similar major is preferred. Candidates without a four-year degree, but with several years of relevant experience, may also be considered.
- Advanced knowledge of Splunk architecture, back-end design, and platform optimization for distributed environments. Proficiency in managing Splunk configuration files and operational workflows.
- Experience with Security Information and Event Management (SIEM) principles, particularly in monitoring, detection, and response, to align monitoring with security objectives.
- Skilled in systems administration (Windows or *nix), networking fundamentals, and tools like PuTTY, WinSCP, RDP, SSH, SAMB, CIFS, and NFS shares.
- Familiarity with advanced network configurations, including network tunneling, cloud-to-on-prem integrations, F5 Load Balancing, and Splunk certificate/SSL management for secured forwarding.
- Strong scripting abilities (Python or similar) and understanding of compliance-related practices such as role-based access control (RBAC) and secure data governance.
- Hands-on experience with web design basics, CI/CD pipelines (Jenkins), source control tools (Bitbucket/Sourcetree), and automation techniques to streamline monitoring operations.
- Demonstrated ability to organize and plan project assignments, lead cross-functional initiatives, and align monitoring goals with business needs while managing deliverables and timelines effectively.
- Excellent communication skills for engaging both in-person and virtual teams.
- A commitment to working closely with other teams and divisions to foster alignment, share insights, and promote the adoption of best practices throughout the organization.
Responsibilities
- Analyzing, designing, and optimizing SEIM architecture to ensure scalable, high-performance monitoring systems.
- Defining and implementing best practices for Splunk development, configuration, and platform operations, ensuring consistency across the organization.
- Serving as the primary Entitlement Contact for our SEIM product, managing vendor relationships, submitting support cases, and coordinating feature requests, upgrades, and product roadmaps.
- Leading monitoring system design reviews, directing the analysis, design, and implementation phases, and ensuring alignment with business, security, and operational objectives.
- Developing and customizing SEIM product apps, dashboards, and advanced visualizations, integrating external systems, and optimizing performance to meet operational and business needs.
- Providing operational oversight of our SEIM platform maintenance, including syslog ingestion, code releases, server and application layer patching, and user support.
- Collaborating with internal teams, affiliates, and external partners to align priorities, address advanced networking requirements, and secure seamless integrations across cloud and on-prem environments.
- Driving cross-departmental initiatives to reduce silos, enhance collaboration, and advance the organization’s monitoring maturity.
- Leading initiatives to improve security and compliance within monitoring systems, including evaluating role-based access controls (RBAC), data governance practices, and certificate/SSL management for secure forwarding.
- Collaborating closely with the IT Monitoring team and the broader Monitoring Community to foster alignment, share knowledge, and promote the adoption of best practices across the organization.
- Maintaining a state-of-the-art awareness of monitoring systems, tools, and data processing techniques, ensuring the organization remains current with emerging technologies.
Preferred Qualifications
- Bachelor’s degree in Computer Science, Computer Engineering, Information Technology, Business Information Systems, Information Systems, or Management Information Systems or a similar major is preferred. Candidates without a four-year degree, but with several years of relevant experience, may also be considered.
- Advanced knowledge of Splunk architecture, back-end design, and platform optimization for distributed environments. Proficiency in managing Splunk configuration files and operational workflows.
- Experience with Security Information and Event Management (SIEM) principles, particularly in monitoring, detection, and response, to align monitoring with security objectives.
- Skilled in systems administration (Windows or *nix), networking fundamentals, and tools like PuTTY, WinSCP, RDP, SSH, SAMB, CIFS, and NFS shares.
- Familiarity with advanced network configurations, including network tunneling, cloud-to-on-prem integrations, F5 Load Balancing, and Splunk certificate/SSL management for secured forwarding.
- Strong scripting abilities (Python or similar) and understanding of compliance-related practices such as role-based access control (RBAC) and secure data governance.
- Hands-on experience with web design basics, CI/CD pipelines (Jenkins), source control tools (Bitbucket/Sourcetree), and automation techniques to streamline monitoring operations.
- Demonstrated ability to organize and plan project assignments, lead cross-functional initiatives, and align monitoring goals with business needs while managing deliverables and timelines effectively.
- Excellent communication skills for engaging both in-person and virtual teams.
- A commitment to working closely with other teams and divisions to foster alignment, share insights, and promote the adoption of best practices throughout the organization.