HimalayasHimalayas logo
Dragonfli GroupDG

Insider Risk Engineer

The Dragonfli Group is a Washington, DC-based LLC that specializes in management and technology consulting.

Dragonfli Group

Employee count: 11-50

United States only

Stay safe on Himalayas

Never send money to companies. Jobs on Himalayas will never require payment from applicants.

Description

Dragonfli Group is a cybersecurity and IT consulting firm providing services to federal agencies and Fortune 100 enterprises. Headquartered in Washington, DC, Dragonfli supports clients in securing mission-critical systems across on-site, hybrid, and fully remote environments.

Dragonfli Group is seeking a Senior Security Engineer with deep Splunk content engineering expertise and a proven track record in insider risk detection. This is a detection-engineering-forward role requiring hands-on SPL development, alert fidelity improvement, and operational investigation support across a complex enterprise toolset including Splunk Enterprise Security, UEBA, CrowdStrike Falcon, Microsoft Purview/Defender/Entra, DLP, and Databricks.

This is a multi-year contract position supporting a large U.S. federal agency. Candidates with prior federal contracting experience are preferred. U.S. Citizenship required. All work must be performed within the continental United States.

Primary Responsibilities:

Detection Engineering and Content Development

  • Design, build, and maintain insider risk detection use cases and monitoring workflows with a primary focus on Splunk Enterprise Security, UEBA, and SPL content engineering
  • Write, optimize, and operationalize Splunk searches, correlation rules, dashboards, and alerts to improve fidelity and reduce false positives
  • Develop and refine detection use cases targeting anomalous user behavior, data exfiltration, policy violations, and suspicious endpoint activity
  • Investigate alert and case trends to identify opportunities for rule tuning, use case expansion, and operational maturity improvement

Incident Response and Investigation

  • Support incident triage, investigation, and response related to insider risk, suspicious user behavior, and potential data misuse
  • Perform CrowdStrike Falcon alert review, tuning, and incident response support including false positive identification and credible threat escalation
  • Lead and assist in investigations involving potential insider threats, intellectual property matters, fraud, and high-stakes security incidents

Program and Tool Maturation

  • Develop and maintain playbooks and response workflows for insider risk scenarios
  • Administer and optimize the insider risk toolset: Splunk ES, UEBA, CrowdStrike, Microsoft Purview/Defender/Entra, DLP, and adjacent technologies
  • Analyze current tool utilization and recommend enhancements to improve detection visibility, investigation efficiency, and operational coverage
  • Support continuous improvement across Splunk, CrowdStrike, Microsoft, DLP, Databricks, and SOAR platforms
  • Implement federal government and industry standards related to insider threat programs and maintain programmatic gap analyses

Stakeholder Coordination

  • Partner with security operations, insider risk, cyber defense, and business stakeholders to improve detection coverage and response posture
  • Coordinate with technology and business leaders to develop programmatic solutions and deliver executive-level presentations on findings and program status





Requirements

Must-Have Qualifications:

  • 7+ years of experience in cybersecurity, security operations, threat detection, insider risk, or incident response
  • 3-5+ years of hands-on Splunk experience including Splunk Enterprise Security, UEBA, content development, alerting, and dashboarding
  • Demonstrated experience writing and optimizing Splunk Search Processing Language (SPL)
  • Experience with CrowdStrike Falcon including alert triage, incident response support, detection tuning, and false positive reduction
  • 2+ years of investigation experience involving insider risk, security incidents, technical investigations, intellectual property matters, fraud, or related areas
  • Experience developing and improving detection use cases, playbooks, and operational workflows
  • Experience working in a heavily regulated environment (federal or financial sector preferred)
  • Strong analytical, communication, and stakeholder coordination skills
  • U.S. Citizenship required

Preferred Qualifications:

  • Experience with DLP, Microsoft Purview, or other insider risk and data protection technologies
  • Experience with SOAR workflows and security automation
  • Familiarity with machine learning concepts applied to insider risk or anomaly detection
  • Experience with endpoint, user behavior, and data activity monitoring in enterprise environments
  • Exposure to Databricks for security analytics, data investigation, or large-scale data analysis use cases
  • Experience in digital forensics and incident response (DFIR)
  • Prior experience supporting large U.S. federal agency contracts
  • BS/BA in a cybersecurity-related field (direct experience or professional certifications may substitute)
  • Relevant certifications: Splunk Core Certified Power User, Splunk Enterprise Security Certified Admin, GCIA, GCIH, GCFE, CISSP, or equivalent

Skill(s)

  • Splunk ES / SPL / UEBA: Content engineering, alerting, dashboarding, and tuning
  • Insider Risk Detection: Use case development, playbook creation, investigation support
  • CrowdStrike Falcon: Alert triage, detection tuning, incident response
  • Microsoft Security Stack: Purview, Defender, Entra
  • DLP and Data Protection Technologies
  • Analytical and Communication Skills: Executive-level reporting, cross-functional coordination
  • Regulated Environment Experience: Federal or financial sector standards and compliance

Benefits

  • Insurance - health, dental, and vision
  • Paid Time Off (PTO) and 11 Federal Holidays
  • 401(k) employer match

About the job

Apply before

Posted on

Job type

Full Time

Experience level

Experience

7 years minimum

Location requirements

Hiring timezones

United States +/- 0 hours

About Dragonfli Group

Learn more about Dragonfli Group and their company culture.

View company profile

The Dragonfli Group is a Washington, DC-based LLC that specializes in management and technology consulting. With a dedicated team of experienced consultants, Dragonfli focuses on transforming its clients' businesses through high-impact strategic planning and technology solutions. Our team's deep expertise spans across infrastructure, corporate strategy, and operations, allowing us to tailor our services to meet specific business needs.

At Dragonfli, we adopt a collaborative approach to provide strategic planning and information security solutions. We understand that every organization is unique, and thus, we take the time to evaluate each client's specific challenges and goals. Our offerings include cybersecurity solutions that empower organizations to manage risks, comply with regulations, and drive profitability. The industry’s dynamic landscape requires businesses to be proactive. As such, we prioritize integrating automated risk management and compliance monitoring into our strategies, ensuring that our clients can make informed, proactive decisions regarding their security posture.

Claim this profileDragonfli Group logoDG

Dragonfli Group

View company profile

Similar remote jobs

Here are other jobs you might want to apply for.

View all remote jobs

8 remote jobs at Dragonfli Group

Explore the variety of open remote roles at Dragonfli Group, offering flexible work options across multiple disciplines and skill levels.

View all jobs at Dragonfli Group

Remote companies like Dragonfli Group

Find your next opportunity by exploring profiles of companies that are similar to Dragonfli Group. Compare culture, benefits, and job openings on Himalayas.

View all companies

Find your dream job

Sign up now and join over 100,000 remote workers who receive personalized job alerts, curated job matches, and more for free!

Sign up
Himalayas profile for an example user named Frankie Sullivan