Chantilly, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
Linux, network appliances, cloud services) to ensure full visibility and compliance. Develop advanced dashboards, reports, alerts, and custom visualizations to support SOC operations and cyber threat detection. Optimize Splunk indexing, search performance, and storage utilization. Collaborate with cybersecurity analysts, engineers, and program stakeholders to drive continuous improvement of monitoring capabilities. Ensure Splunk implementation aligns with federal cybersecurity standards (e.g. … experience with Splunk engineering in a federal or DoD environment. Experience integrating and parsing logs from a variety of enterprise and security systems. Familiarity with regular expressions (regex), SPL (SearchProcessingLanguage), and custom log ingestion. Knowledge of cybersecurity operations, incident response, and SIEM use cases. Strong scripting skills (Python, PowerShell, Bash) for automation and customization. Preferred More ❯
on Linux experience. Must include executing program installation and configuration from the command line • 2+ years Splunk Administrator or Architect experience including, but not limited to, Splunk Administration; SplunkSearchProcessinglanguage; Splunk Reporting and Dashboard Creation • Experience with client/server communications privacy using private key infrastructure • Scripting expertise using regex (regular expressions) within Splunk • Experience More ❯
that has 7+ years of experience managing a Splunk Platform, creating Splunk applications, and using IT Service Intelligence (ITSI). The Splunk engineer will build applications to help manage, search, analyze, and visualize data. The role includes troubleshooting and performing Splunk application development following a Scrum Agile approach. The role also includes integrating Splunk with other applications (e.g., ServiceNow … Python, Perl, and JavaScript in relation to Splunk Apps/Add-ons o SQL for querying structured data o Knowledge of XML and JSON for data handling o SplunkSearchProcessingLanguage (SPL) for data analysis in SplunkMore ❯
leading IT implementation tasks in a Linux environment 1+ year of experience in Splunk administration or operations and maintenance, including both front-end and back-end Experience with SplunkSearchProcessingLanguage (SPL) Experience in Splunk front-end dashboard creation, configuration, maintenance, queries, or custom content creation Experience with administering Splunk back-end architecture components, including indexers More ❯
functional requirements, and allocation of the same to individual hardware, software, facility, and personnel components. Key Skills: - Splunk Enterprise architecture, deployment, and clustering - Data onboarding (forwarders, heavy forwarders, HEC) - SearchProcessingLanguage (SPL) and dashboard environment - Knowledge of security and infrastructure data sources (SysLog, Windows event logs, NetFlow) - Altering, reporting, and playbook integration - Experience with Splunk IT More ❯
Kibana). Bachelor's degree in Cybersecurity, Data Analytics, Information Systems, or a related field. Active Public Trust or Secret clearance. Strong knowledge of query languages such as SPL (SearchProcessingLanguage) and Elasticsearch Query DSL. Experience integrating and visualizing data from sources such as Tenable Nessus, ServiceNow, Xacta, Power BI, or CDM tools. Understanding of cybersecurity More ❯
and network protocols. Similar experience within a telecommunications environment and technologies is considered of high value. Experience with Splunk Enterprise Security is mandatory. You have knowledge of a query language (KQL, SPL.) Experience within a SOC environment is considered of high value. Experience with public cloud (Azure, GCP, AWS.) is considered of high value. You are flexible and a More ❯
and network protocols. Similar experience within a telecommunications environment and technologies is considered of high value. Experience with Splunk Enterprise Security is mandatory. You have knowledge of a query language (KQL, SPL.) Experience within a SOC environment is considered of high value. Experience with public cloud (Azure, GCP, AWS.) is considered of high value. You are flexible and a More ❯
and network protocols. Similar experience within a telecommunications environment and technologies is considered of high value. Experience with Splunk Enterprise Security is mandatory. You have knowledge of a query language (KQL, SPL.) Experience within a SOC environment is considered of high value. Experience with public cloud (Azure, GCP, AWS.) is considered of high value. You are flexible and a More ❯
and network protocols. Similar experience within a telecommunications environment and technologies is considered of high value. Experience with Splunk Enterprise Security is mandatory. You have knowledge of a query language (KQL, SPL.) Experience within a SOC environment is considered of high value. Experience with public cloud (Azure, GCP, AWS.) is considered of high value. You are flexible and a More ❯
and network protocols. Similar experience within a telecommunications environment and technologies is considered of high value. Experience with Splunk Enterprise Security is mandatory. You have knowledge of a query language (KQL, SPL.) Experience within a SOC environment is considered of high value. Experience with public cloud (Azure, GCP, AWS.) is considered of high value. You are flexible and a More ❯
and network protocols. Similar experience within a telecommunications environment and technologies is considered of high value. Experience with Splunk Enterprise Security is mandatory. You have knowledge of a query language (KQL, SPL.) Experience within a SOC environment is considered of high value. Experience with public cloud (Azure, GCP, AWS.) is considered of high value. You are flexible and a More ❯
and network protocols. Similar experience within a telecommunications environment and technologies is considered of high value. Experience with Splunk Enterprise Security is mandatory. You have knowledge of a query language (KQL, SPL.) Experience within a SOC environment is considered of high value. Experience with public cloud (Azure, GCP, AWS.) is considered of high value. You are flexible and a More ❯
and network protocols. Similar experience within a telecommunications environment and technologies is considered of high value. Experience with Splunk Enterprise Security is mandatory. You have knowledge of a query language (KQL, SPL.) Experience within a SOC environment is considered of high value. Experience with public cloud (Azure, GCP, AWS.) is considered of high value. You are flexible and a More ❯
and network protocols. Similar experience within a telecommunications environment and technologies is considered of high value. Experience with Splunk Enterprise Security is mandatory. You have knowledge of a query language (KQL, SPL.) Experience within a SOC environment is considered of high value. Experience with public cloud (Azure, GCP, AWS.) is considered of high value. You are flexible and a More ❯
and network protocols. Similar experience within a telecommunications environment and technologies is considered of high value. Experience with Splunk Enterprise Security is mandatory. You have knowledge of a query language (KQL, SPL.) Experience within a SOC environment is considered of high value. Experience with public cloud (Azure, GCP, AWS.) is considered of high value. You are flexible and a More ❯
and network protocols. Similar experience within a telecommunications environment and technologies is considered of high value. Experience with Splunk Enterprise Security is mandatory. You have knowledge of a query language (KQL, SPL.) Experience within a SOC environment is considered of high value. Experience with public cloud (Azure, GCP, AWS.) is considered of high value. You are flexible and a More ❯
and network protocols. Similar experience within a telecommunications environment and technologies is considered of high value. Experience with Splunk Enterprise Security is mandatory. You have knowledge of a query language (KQL, SPL.) Experience within a SOC environment is considered of high value. Experience with public cloud (Azure, GCP, AWS.) is considered of high value. You are flexible and a More ❯
and network protocols. Similar experience within a telecommunications environment and technologies is considered of high value. Experience with Splunk Enterprise Security is mandatory. You have knowledge of a query language (KQL, SPL.) Experience within a SOC environment is considered of high value. Experience with public cloud (Azure, GCP, AWS.) is considered of high value. You are flexible and a More ❯
and network protocols. Similar experience within a telecommunications environment and technologies is considered of high value. Experience with Splunk Enterprise Security is mandatory. You have knowledge of a query language (KQL, SPL.) Experience within a SOC environment is considered of high value. Experience with public cloud (Azure, GCP, AWS.) is considered of high value. You are flexible and a More ❯
and network protocols. Similar experience within a telecommunications environment and technologies is considered of high value. Experience with Splunk Enterprise Security is mandatory. You have knowledge of a query language (KQL, SPL.) Experience within a SOC environment is considered of high value. Experience with public cloud (Azure, GCP, AWS.) is considered of high value. You are flexible and a More ❯
and network protocols. Similar experience within a telecommunications environment and technologies is considered of high value. Experience with Splunk Enterprise Security is mandatory. You have knowledge of a query language (KQL, SPL.) Experience within a SOC environment is considered of high value. Experience with public cloud (Azure, GCP, AWS.) is considered of high value. You are flexible and a More ❯
and network protocols. Similar experience within a telecommunications environment and technologies is considered of high value. Experience with Splunk Enterprise Security is mandatory. You have knowledge of a query language (KQL, SPL.) Experience within a SOC environment is considered of high value. Experience with public cloud (Azure, GCP, AWS.) is considered of high value. You are flexible and a More ❯
and network protocols. Similar experience within a telecommunications environment and technologies is considered of high value. Experience with Splunk Enterprise Security is mandatory. You have knowledge of a query language (KQL, SPL.) Experience within a SOC environment is considered of high value. Experience with public cloud (Azure, GCP, AWS.) is considered of high value. You are flexible and a More ❯
and network protocols. Similar experience within a telecommunications environment and technologies is considered of high value. Experience with Splunk Enterprise Security is mandatory. You have knowledge of a query language (KQL, SPL.) Experience within a SOC environment is considered of high value. Experience with public cloud (Azure, GCP, AWS.) is considered of high value. You are flexible and a More ❯