and maintenance. Design and develop software solutions, employing technologies such as C#, C , SQL Server, Microsoft Windows Server, and Linux. Monitor, troubleshoot, and enhance system operations using tools like Splunk and Grafana/Prometheus. Work with Jira and Confluence for agile management. Produce technical documentation, including system designs, Interface Control Documents (ICDs), and operational procedures. Collaborate with cross-functional teams … software development experience. Hands-on experience with secure systems engineering, systems integration, and reverse engineering. Proficiency in programming languages: C#, C , SQL. Experience working with tools like JIRA, Confluence, Splunk, and Enterprise Architect. Strong skills in debugging, performance optimization, and DevOps practices. Background in on-call support and operational monitoring of critical systems. Clearance Required: TS/SCI w/ More ❯
SSH, SMTP, SMB, NFS, etc. • In depth knowledge and experience of Wifi networking • In depth knowledge and experience of network topologies - DMZ's, WAN's, etc. • Substantial knowledge of Splunk (or other SIEM's) • Understanding of MITRE Adversary Tactics, Techniques and Common Knowledge (ATT&CK) • Experience with Snort Rules, Yara Rules, PCAP Analysis, network topologies/network architecture (TCP/… to standard operating procedures or national standards • Proficiency with designing cyber security systems and environments in a Linux and/or Windows environment • Proficiency with virtualized environments Operational Tools: • Splunk use is a must, Splunk certs are great. Operational use is key. • Demonstrated use with: Zeek/Bro, Gigamon or other packet brokers, Wireshark, ELKStack, ArcSight, SourceFire NetWitness, Tanium, Palo More ❯
Reston, Virginia, United States Hybrid / WFH Options
Zachary Piper Solutions, LLC
and network devices. Configure and manage Windows, UNIX, and Linux systems, and install and load operating system and application software, including Host-based Security System, Endpoint Security Suite (ESS), Splunk, Cribl, and network security tools, including Firewalls and ForeScout. Support Windows and Linux systems engineering efforts in system design and evaluation, solution engineering, software development, or system administration. Qualifications for … years =mid) Experience with installing, configuring, or maintaining devices, applications, and security tools, including Palo Alto Firewalls, Trellix ESS or former McAfee HBSS, ePO, and FireEye tools, Splunk and Cribl or ForeScout Experience with automating deployments, configuration management, or cybersecurity tools operations Experience with Cloud Enterprise and authorizing cloud systems Experience with Cloud services, including AWS, Azure, or GCP Experience More ❯
delivering timely, relevant, information to stakeholders. ACTIVITIES & RESPONSIBILITIES Continuously monitor threat intelligence platforms, feeds, and cybersecurity news to detect emerging threats. Conduct deep-dive investigations into alerts generated by Splunk or other monitoring tools. Develop and maintain threat intelligence reports, dashboards, and threat models. Collaborate with SOC, IR, and vulnerability management teams to contextualize and act on threat intelligence. Support … analyzing, and interpreting cyber threats from various internal and external sources to assess relevance and impact on the organization. Security Information and Event Management (SIEM) Tools - Proficient in using Splunk Enterprise Security for log analysis, alerting, and correlation of security events. Familiar with Microsoft Sentinel for threat detection and response. Incident Response Support - Collaborating with incident response teams to provide … QUALIFICATIONS Bachelor's degree, preferably in an IT-related field 10+ years of experience in IT with a minimum of 4 years in Cybersecurity Active TS Clearance Experience with Splunk Enterprise Security PREFERRED QUALIFICATIONS & COMPETENCIES Experience with Microsoft Sentinel Related certifications, such as GIAC Cyber Threat Intelligence (GCTI) Overview We are seeking an experienced Cybersecurity Analyst/Cyber Threat Intelligence More ❯
Washington, DC Desired Qualifications include: One of the following certifications: GIAC Certified Intrusion Analyst (GCIA) GIAC Certified Incident Handler (GCIH) GIAC Continuous Monitoring (GMON) GIAC Defending Advanced Threats (GDAT) Splunk Core Power User EnCase Certified Examiner SANS GCFA Volatility Certified Duties: Provides digital forensics and incident response support to the AOUSC Security Operations Center (SOC). Collects, analyzes, and evaluates … forensic artifacts of operating systems (e.g., Windows, Linux, and macOS) to discover elements of an intrusion and identify root cause. Perform live forensic analysis based on SIEM data (e.g., Splunk). Perform filesystem timeline analysis for inclusion in forensic report. Extract deleted data using data carving techniques. Collect and analyze data from compromised systems using EDR agents and custom scripts More ❯
process. - Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements. - Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others. - Stay updated with emerging DevSecOps trends, tools, and practices, and provide recommendations for implementing new technologies. - Provide mentorship and guidance to junior engineers in DevSecOps practices … Participation in a rotational on-call schedule for emergency page-outs is required. - Additional tasks to be assigned as needed. - Experience in any or all the following: - Docker Enterprise, Splunk, Chef, Chef Automate, Chef (Ruby), Puppet, Ansible, Kubernetes, Openshift - Hands-on working experience in Terraform (IaC), Jenkins groovy scripts, and Python. Minimum Requirements TCS087, T3, Band 6 EEO Statement Maximus More ❯
process. - Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements. - Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others. - Stay updated with emerging DevSecOps trends, tools, and practices, and provide recommendations for implementing new technologies. - Provide mentorship and guidance to junior engineers in DevSecOps practices … Participation in a rotational on-call schedule for emergency page-outs is required. - Additional tasks to be assigned as needed. - Experience in any or all the following: - Docker Enterprise, Splunk, Chef, Chef Automate, Chef (Ruby), Puppet, Ansible, Kubernetes, Openshift - Hands-on working experience in Terraform (IaC), Jenkins groovy scripts, and Python. Minimum Requirements TCS087, T3, Band 6 EEO Statement Maximus More ❯
process. - Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements. - Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others. - Stay updated with emerging DevSecOps trends, tools, and practices, and provide recommendations for implementing new technologies. - Provide mentorship and guidance to junior engineers in DevSecOps practices … Candidates must reside within a commutable distance. - Participation in a rotational on-call schedule for emergency page-outs is required. - Experience in any or all the following: - Docker Enterprise, Splunk, Chef, Chef Automate, Chef (Ruby), Puppet, Ansible, Kubernetes, Openshift - Hands-on working experience in Terraform (IaC), Jenkins groovy scripts, and Python. - Additional tasks to be assigned as needed. Minimum Requirements More ❯
systems and sensitive data. Monitor network traffic, system logs, and security alerts to identify potential threats, anomalies, or suspicious activities. Use Security Information and Event Management (SIEM) tools (e.g., Splunk, ArcSight, or QRadar) to aggregate and analyze security events. Investigate and escalate security incidents, including malware infections, phishing attempts, and unauthorized access. Respond to and mitigate cybersecurity incidents following established … operating systems, and cybersecurity threats (e.g., malware, phishing, ransomware). Experience with scripting or automation tools (e.g., Python, PowerShell) is a plus. Proficiency with cybersecurity tools, such as SIEM (Splunk, ArcSight), vulnerability management platforms (Tenable, Qualys), and IAM systems. Experience with secure software development and DevSecOps practices. Original Posting: April 8, 2025 For U.S. Positions: While subject to change based More ❯
understanding of TCP/IP Manage storage solutions including NAS, SAN and iSCSI (experience with Nimble and NetApp desirable) Administer VMware vCenter environments Utilise infrastructure monitoring tools such as Splunk Provide excellent written and verbal communication, maintaining professional relationships with customers and technical teams Demonstrate strong organisational skills, initiative, and a proactive approach Excellent opportunity within a hybrid environment dealing More ❯
understanding of TCP/IP Manage storage solutions including NAS, SAN and iSCSI (experience with Nimble and NetApp desirable) Administer VMware vCenter environments Utilise infrastructure monitoring tools such as Splunk Provide excellent written and verbal communication, maintaining professional relationships with customers and technical teams Demonstrate strong organisational skills, initiative, and a proactive approach Excellent opportunity within a hybrid environment dealing More ❯
Employment Type: Full-Time
Salary: £50,000 - £65,000 per annum, Negotiable, Pro-rata, Inc benefits
navigate those tools and assisting projects with steps needed to complete authorization Xacta or Greenlight 360 compliance and risk assessment application tool Rapid7 scanning and vulnerability remediation NMAP scans Splunk Administration knowledge and skills Securing and monitoring enterprise level Cisco network, VOIP, and VTC devices Administering, securing and monitoring enterprise level Windows and Linux network infrastructures Desired Experience and Qualifications … Certified Information Systems Security Professional (CISSP) Certification(s). Certified Splunk Administrator Click here to read more about how we protect your information Position 1. Open Position - TS/SCI EOE Statement Assertive Professionals, LLC, is an equal employment opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity More ❯
months of employment Minimum 2 years of experience with helpdesk operations or application management Experience implementing or operating within DoD technical security concepts and practices such as STIGs, ACAS, Splunk, and SCC Knowledge of principles of data flow (e.g., TCP/IP, OSI model) Experience in providing system administration support to both physical and virtual machines Able to perform physical … Experience with virtualization (KVM, Ansible, VMWare hypervisor/vSphere v6.5) Experience with account management in Red Hat IdM (FreeIPA) Experience conducting server maintenance and server component replacement Experience with Splunk log analysis for cybersecurity or preventive maintenance opportunities DOD 8570.01M IAT 2 Certification Security+ CE Must be a U.S. Citizen and able to achieve and maintain a DOD Security clearance More ❯
compliance of multiple IT Security and Audit requirements in coordination with Security, IT Management, Audit, and Compliance. Provide input and assistance as an IT team member. Identifying or writing Splunk Apps/Dashboards to aid in Security and Operational issues. Assists in maintaining IT Security policies, procedures, and documentation. Performs comparisons between existing standards and practices and work instructions, correcting … to formulate and apply remediation action. Build and maintain cloud components specific to security, identity, and governance in multiple cloud providers. The ideal candidate will have: 3 years of Splunk Admin roles. 10 years of Cyber Experience. Ability to establish and participate in Implementation Teams and provide IT security considerations and planning to program management and engineering. Knowledge and practical More ❯
Strong hands-on experience with AWS (eg EC2, EKS, CloudWatch, Lambda). Background in incident, change, and problem management; comfortable with on-call rotations. Expertise in Prometheus, Grafana, and Splunk; solid knowledge of PromQL. Proficient in Scripting/programming (Python, Go, Bash, SQL). Salary: £500 per day More ❯
activities during red team exercises. Your Profile: Bachelor's in Computer Science, Information Security, or equivalent experience. Strong understanding of Windows, Linux, internet technologies, and network protocols. Experience with Splunk Enterprise Security is a must. Proficiency with query languages (e.g., SPL, KQL). Experience in a SOC environment is a strong plus. Cloud exposure (Azure, AWS, GCP) is highly valued. More ❯
Primary Responsibilities: Shift schedule: Day Shift Utilize state of the art technologies such as host forensics tools(FTK/Encase), Endpoint Detection & Response tools, log analysis (Splunk) and network forensics (full packet capture solution) to perform hunt and investigative activity to examine endpoint and network-based data. Conduct malware analysis, host and network, forensics, log analysis, and triage in support More ❯
curve on emerging threats, tactics, and techniques To secure this SOC role: Proven experience in a Security Operations Centre (SOC) environment Hands-on knowledge of SIEM tools (Microsoft Sentinel, Splunk, etc.) Familiarity with MITRE ATT&CK and threat detection methodologies Strong analytical mindset with log, endpoint, and network analysis skills Understanding of network protocols (TCP/IP, DNS, HTTP, SMTP More ❯
organize and prioritize numerous customer requests in a fast pace deadline driven environment Familiarity with Amazon Web Services (AWS) Familiarity with customer's IA processes Experience with ServiceNow and Splunk Experience supporting IC or DoD in the Cyber Security Domain Familiarity with the RMF process Experience with Relational Database Management System (RDMS) Experience with Apache Hadoop and the Hadoop Distributed More ❯
as Sec+, CASP, CISSP, or equivalent. • A professional certification specific to the networking industry like a CCNA/CCNP/CCIE or equivalent. • Familiar with network management applications, like Splunk, Firepower Management Center (FMC), and/or Cisco ISE. • Exposure to the Risk Management Framework, associated security controls, and STIGs. • Familiar with Windows, Linux, and VMWare configuration and troubleshooting. • Experience More ❯
curve on emerging threats, tactics, and techniques To secure this SOC role: Proven experience in a Security Operations Centre (SOC) environment Hands-on knowledge of SIEM tools (Microsoft Sentinel, Splunk, etc.) Familiarity with MITRE ATT&CK and threat detection methodologies Strong analytical mindset with log, endpoint, and network analysis skills Understanding of network protocols (TCP/IP, DNS, HTTP, SMTP More ❯
or Bachelor's degree in Cybersecurity, IT, or related field (or equivalent experience) • 2+ years of experience in a SOC or cybersecurity analyst role • Familiarity with SIEM tools (e.g., Splunk, QRadar, ArcSight), EDR platforms, and firewalls • Understanding of common attack vectors, malware types, and incident response methodologies • Strong analytical and problem-solving skills • Excellent verbal and written communication skills Preferred More ❯
up automated alerts and building dashboards Working knowledge of automation (PowerShell, Python, or similar) Analytical mindset with a drive for uptime, insight, and continuous improvement Experience with SIEM tools (Splunk, ELK, Azure Sentinel) Microsoft certifications (AZ-104, AZ-305, AZ-500) Experience building or contributing to customer-facing system status tools Cloud Monitoring & Data Analyst rewards: A base salary circa More ❯
or updated technologies. Qualifications 7+ years of proven hands-on experience engineering, implementing and operating enterprise-level operating systems, applications and technologies Cisco, Red Hat, Microsoft, Nutanix, ServiceNow, Ansible, Splunk, Citrix, and/or VMware. Demonstrated proficiency in at least one of the following areas: Capturing, analyzing, and decomposing stakeholder and/or product requirements to generate design solutions that More ❯