Reston, Virginia, United States Hybrid / WFH Options
NTT DATA Federal Services, Inc
the past 3 years) with Azure Cloud Computing. - Experience supporting any or all these products or technologies: Red Hat Satellite, Nagios, ForeScout, CyberArk, Layer7 PAM, SailPoint, Ansible, Puppet, Chef, Splunk, AMQP (RabbitMQ), Nessus suit, Swimlane, Qualys, SCCM/MECM, BigFix, MDM solutions, JIRA Where required by law, NTT DATA provides a reasonable range of compensation for specific roles. The starting More ❯
SRE), or a similar role. Proficiency in cloud platforms (AWS, Azure, GCP) and associated reliability tools. Hands-on experience with monitoring and logging tools such as Prometheus, Grafana, Datadog, Splunk, or ELK stack. Proficiency in scripting languages like Python, Bash, or Go for automation. Familiarity with containerization and orchestration tools (Docker, Kubernetes). Strong understanding of distributed systems, fault tolerant More ❯
tools like Helm, Kustomize and ArgoCD for microservice orchestration. • Detailed understanding of Cloud Foundry architecture and development methodology. • Systems Administration and/or Cloud certifications a plus. • Knowledge of Splunk or similar SIEM Platform. ADDITIONAL REQUIREMENTS • BA/BS Degree is required. Ideally in Computer Science, Cyber Security, Information Security, Engineering, Information Technology. MA/MS Preferred. Note: The job More ❯
for Cloud, Storage (SQL) and CSPM. Proficient with Data loss prevention tools experience, such as MS Purview Compliance Manager and Tessian Security monitoring, SIEM tooling such as Exabeam, QRadar, Splunk and Sentinel. Experience with Azure (security centre) and M365 cloud infrastructure and configuration and on-premises Active Directory Experience in Cloud email security gateway services, Microsoft Exchange Online, Mimecast and More ❯
as NIST 800-207 Experience with ICAM principles and technologies such as multi-factor authentication or privileged access management Experience with Security Information and Event Management ( SIEM ) systems, including Splunk, Elastic, Logstash, or Kibana Knowledge of data broker technologies such as Cribl, Confluent, Operating Systems Security Events, including Windows or Linux, and networking protocols, including TCP/IP, DNS, DHCP More ❯
systems: OpenStack, OpenShift, Docker, Kubernetes, Microsoft Azure, and Amazon Web Services Application servers: Node.js, Oracle Weblogic, Oracle Glassfish, JBoss and Apache Tomcat Data environments: Oracle, Sybase, PostGreSQL, MySQL, MongoDB, Splunk, and Elasticsearch/Logstash/Kibana (ELK), Neo4j Operating system environments: Windows, Linux, and MacOS Software requirements management: Atlassian Suite, EPICS, Story Board Data Science: Statistical Analysis, Data Visualization, Graph More ❯
tools such as Cloudformation, AWS CDK, Ansible to automate infrastructure provisioning, environment setup and software deployment Experience implementing system monitoring and alerting using tools such as Cloudwatch, Appdynamics, Kibana, Splunk or Prometheus Experience with one or more Public/Private cloud offerings and with Virtualisation Technologies Knowledge of RESTful APIs, how to consume them and how to invoke/engage More ❯
incident response. Key Responsibilities - Manage and monitor AWS infrastructure for performance and security - Respond to production incidents, perform root cause analysis, and implement fixes - Maintain observability tools (Prometheus, Grafana, Splunk) and write PromQL queries - Improve and operate CI/CD pipelines using GitHub Actions and Kubernetes - Automate infrastructure tasks with Python, Bash, Go or SQL - Work with Git-based workflows … call rotation to ensure system reliability Your Profile Essential: - Solid hands-on AWS experience in a DevOps setting - Background in incident, change, and problem management - Strong with Prometheus, Grafana, Splunk, and PromQL - Proficient in scripting (Python, Go, Bash, SQL) - Skilled in GitHub, CI/CD, and Kubernetes operations Desirable: - Experience with Terraform or CloudFormation - Advanced log analysis with Splunk - Strong More ❯
in computer science, Information Technology, or a related field, or equivalent work experience Five years of experience in developing, implementing, and managing SIEM correlation rules and content (such as Splunk, ArcSight, Kibana, LogRhythm) Experience with writing audit log parsers for SIEM data structures such as ArcSight's CEF or Splunk's SPL Advanced knowledge of TCP/IP (Transport protocols … understanding, documenting, communicating, and presenting technical issues in a non-technical manner to audiences with varying degrees of technical expertise Preferred qualifications: Highly Preferred to have an Active SCI Splunk Enterprise Security Admin, Splunk Certified Developer certification Extensive experience with User activity monitoring (UAM) ,User Entity Behavior Analytics (UEBA) and DLP tools Expertise in developing Insider Threat trigger policies Investigate More ❯
Cheltenham, England, United Kingdom Hybrid / WFH Options
Searchability NS&D
to start – must be active (West) Globally leading defence/cyber security company Up to £65k DoE - plus benefits and bonuses Cheltenham location – hybrid working model Experience required in Splunk/ELK, Linux, Apache NiFi, Java/Python, Docker/Kubernetes Who Are We? We are recruiting a Senior Support Engineer to work with a multi-national, industry-leading cyber … enhanced DV Clearance (West) Willing to work full-time on-site in Cheltenham when required. Proven experience supporting and debugging complex live systems, including log monitoring with tools like Splunk or the ELK stack. Strong ability to manage tasks proactively while adapting to shifting priorities. Proficiency in Linux server administration. Experience with technologies such as Apache NiFi, MinIO, and AWS … you. SENIOR SUPPORT ENGINEER KEY SKILLS: SUPPORT ENGINEER/LINUX/UNIX/AWS/DOCKER/KUBERNETES/PYTHON/ANSIBLE/JAVA/ELK/APACHE/SPLUNK/APACHE NIFI/DV CLEARED/DV CLEARANCE/DEVELOPED VETTING/DEVELOPED VETTED/DEEP VETTING/DEEP VETTED/CHELTENHAM/SECURITY CLEARED/SECURITY CLEARANCE More ❯
Herndon, Virginia, United States Hybrid / WFH Options
The DarkStar Group
development lifecycle (SDLC). Work closely with software developers and cloud engineers to integrate security and automation into the software development lifecycle. Support AWS CloudWatch, AWS Security Hub, GuardDuty, SPLUNK, or ELK for proactive monitoring, logging, and compliance reporting. Manage multiple SPLUNK environments and create SPLUNK queries and dashboards as needed. Participate in security testing, audits, and incident response activities. More ❯
in computer science, Information Technology, or a related field, or equivalent work experience Five years of experience in developing, implementing, and managing SIEM correlation rules and content (such as Splunk, ArcSight, Kibana, LogRhythm) Experience with writing audit log parsers for SIEM data structures such as ArcSight's CEF or Splunk's SPL Advanced knowledge of TCP/IP (Transport protocols … understanding, documenting, communicating, and presenting technical issues in a non-technical manner to audiences with varying degrees of technical expertise Preferred qualifications: Highly Preferred to have an Active SCI Splunk Enterprise Security Admin, Splunk Certified Developer certification Extensive experience with User activity monitoring (UAM) ,User Entity Behavior Analytics (UEBA) and DLP tools Expertise in developing Insider Threat trigger policies Investigate More ❯
experience working on Government Agency enterprise infrastructure and engineering programs. Preferred Education, Experience, & Skills Nessus/Rapid7 Security Development and Operations (SecDevOps) Various security tools and processes such as Splunk, Nessus Security Center, WebInspect, Xacta Cloud security controls and implementation STIG compliance and vulnerability management CISSP AWS Certified Security Specialty Microsoft Office365 Experience in one or more software products associated … with cyber system engineering for data analytics including SQL security, TANIUM Endpoint Management Software, Powershell, MacAfee, App Blocker, Splunk ITSI. Experience with one or more software development environments supporting commercial or open source tools including but not limited to: Linux, Python, C, Bash Scripting, Perl, SQL, Splunk Phantom, UBA, and UIPath Experience in one or more cloud computing services and More ❯
cybersecurity analysts and stakeholders. The Data Analyst shall utilize the GISA Governance Board determined Security Information and Event Management (SIEM) solution, which as of January 2025 is transitioning from Splunk to a new architecture based on Elastic, Logstash, and Kibana (ELK), leveraging Cribl as a data broker to streamline and optimize data ingestion and processing. Additionally, the role involves implementing … CISSP, CISM, or equivalent certification. Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field OR 10+ Years experience with Enterprise SIEM Data Observability and Reporting (Splunk/Elastic) Technical Skills: Thorough understanding of cybersecurity principles, best practices, and emerging threats. Proficiency in vulnerability scanning and cybersecurity tools, including Tenable. Security Information and Event Management (SIEM) systems … Splunk, Elastic, Logstash, Kibana (ELK) Data broker technologies: Cribl, Confluent Operating Systems Security Events: Windows, Linux Networking protocols: TCP/IP, DNS, DHCP, HTTP/HTTPS Cybersecurity tools and technologies: IDS/IPS, firewalls, host based security, threat intelligence platforms, vulnerability management tools Technical Expertise: Advanced knowledge of Security Incident and Event Management (SIEM) tools, vulnerability management, compliance, and cybersecurity More ❯
Identity and Access Management (IAM) solutions and zero-trust architecture. • Understanding and implementation experience with Virtual Desktops. • Experience with system performance optimization, capacity planning, and monitoring using tools like Splunk, SolarWinds. • Understanding of networking concepts and secure network design tailored to secure government systems. • Strong knowledge of patch management strategies for both Microsoft and RHEL • Familiarity with network troubleshooting tools … controls). • Knowledge of government-specific security requirements and frameworks (e.g., Continuous Diagnostics and Mitigation (CDM), NIST 800-171). • Experience with government-approved security tools such as Tenable, Splunk, or CrowdStrike. SOFT SKILLS: • Inherent experience with collaborating with cross-functional teams within the organization, and other offices to ensure the integration and compatibility of IT solutions with other IT More ❯
ICDs), IC Technical Implementation Guides (TIGs), Security Technical Implementation Guides (STIGs), Security Requirement Guides (SRGs), and NIST 800-53 rev 5 security controls. Utilizing automated tools, including Tenable and Splunk, these professionals perform documentation reviews, employ checklists and guides to write report and develop a qualitative risk assessment on target organizations. Their assessments examine the mission owners' critical capabilities and … Proficiency: Experience in engineering and operations & maintenance of enterprise ESXi, Hyper-V, and Storage technologies. Advanced Skills: Proficiency in using advanced vulnerability assessment and reporting tools such as Tenable, Splunk, and Tableau. Interdivision Collaboration: Demonstrated ability to operate across departments to implement cybersecurity principles effectively. Multitasking and Time Management: Capable of multitasking with efficient time management and possessing a comprehensive More ❯
Cloud Access Security Broker (CASB) and Cloud Secure Gateway (CSG) technologies. Coordinate with related technology acquisition programs and communities of interest to leverage ongoing investments in tools such as Splunk, Swimlane, Crowdstrike, Grafana, Axonius, Tenable, GitLab, etc. Must be resourceful in multitasking tasks and projects and communicating in a dynamic network. Prior consulting or contracting experience is ideal; DHS experience … Certified Architect (RHCA) RHCSA (Red Hat Certified System Administrator) RHCE (Red Hat Certified Engineer) MCSA (Microsoft Certified Solutions Associate) MCSE (Microsoft Certified System Expert) Software/Hardware Experience Desired Splunk Enterprise, Crowdstrike, Ansible, Red Hat, Linux, Tenable, AWS and Azure Cloud Requirements TA2 -13 Lead Principal Security Engineer 25-02-10 (LCAT: Senior Security Engineer) Position Summary Softek International is More ❯
CI and Jenkins Experience developing with multiple programming languages such as Java, Go, and Python Experience with software frameworks used for searching, monitoring, and analyzing big data such as Splunk and Elastic Stack Experience with SQL technologies such as MySQL, MariaDB, and PostgreSQL Experience with NoSQL technologies such as MongoDB and Elasticsearch Experience with designing, implementing, and using REST and More ❯