implementation of service mapping to establish clear relationships between business services and underlying infrastructure • Identify and build business applications from discovered/ingested Asset data and mature a ServiceNow-Splunk integration for enhanced security monitoring and incident response. • Configure and enhance ServiceNow SIR and SecOps modules to support CSOC incident response and Vulnerability Management capability. • Develop and maintain documentation for More ❯
implementation of service mapping to establish clear relationships between business services and underlying infrastructure • Identify and build business applications from discovered/ingested Asset data and mature a ServiceNow-Splunk integration for enhanced security monitoring and incident response. • Configure and enhance ServiceNow SIR and SecOps modules to support CSOC incident response and Vulnerability Management capability. • Develop and maintain documentation for More ❯
of required security controls; and implementing continuous monitoring and auditing of solutions for compliance with security controls. Strong skills in specifying and implementing log collection into tools such as Splunk, and performing querying and analysis of aggregated logs to identify security-relevant anomalies or risks Strong experience in implementing security controls from government regulatory frameworks and security standards (e.g., NIST More ❯
capability growth. Understand and adapt to the needs of different stages in the product lifecycle, using appropriate performance metrics accordingly. Essential Experience Use of digital analytics platforms (e.g., GoogleAnalytics, Splunk, Datadog). Experience working in a GDS-aligned environment within a government setting. Development of service performance dashboards using tools such as Google Data Studio. Designing and implementing performance frameworks More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
True North Group
capability growth. Understand and adapt to the needs of different stages in the product lifecycle, using appropriate performance metrics accordingly. Essential Experience Use of digital analytics platforms (e.g., GoogleAnalytics, Splunk, Datadog). Experience working in a GDS-aligned environment within a government setting. Development of service performance dashboards using tools such as Google Data Studio. Designing and implementing performance frameworks More ❯
threat mitigation in regulated (FISMA/DoD) environments. • 5+ years specifically focused on vulnerability detection and response within DoD systems. • Hands-on expertise in cybersecurity analytics platforms such as Splunk and Elasticsearch. Certifications (IAT Level III - one required): • CISSP (or Associate) • CISA • GCIH • SCNCA • GSE Additional Required Training: • DISA ACAS Operator CBT • Annual Cyber Awareness Education: • Master's degree in More ❯
experience (min. 4 years). 2-4 years in a cybersecurity or SOC environment. Strong understanding of OSI model, incident response, and threat analysis. Proficient in SIEM tools (e.g., Splunk), IAM, server/network security, and vulnerability management. Familiarity with ISO 27001, NIST CSF, and general security frameworks. Effective communicator across all organizational levels; strong multitasking and organization skills. Experience More ❯
Horizon, Citrix VDI). They need in-depth experience with Active Directory, LDAP and Centrify for identity management, Infoblox for core network services, and proficiency in using Nagios and Splunk for comprehensive system monitoring and analytics. Skills in automation scripts and experience with Salt and Ansible for configuration management are crucial. • Lead security vulnerability assessments and mitigation efforts on Linux More ❯
in accordance with DLA policies. • Manage user/system accounts using Red Hat Identity Manager (IDM) and support ACAS scanning and vulnerability remediation. • Install and support COTS applications (e.g., Splunk, HBSS, ArcSight) and monitor performance, logs, and alerts. • Troubleshoot complex issues involving system performance, integrity, and security for both NIPRnet and SIPRnet environments. • Provide Tier II/III technical support More ❯
MITRE ATT&CK required - Experience with open-source intelligence (OSINT) collection methods and tools preferred - Bachelor's Degree preferred - Preferred certifications include: GIAC Cyber Threat Intelligence (GCTI) Microsoft Sentinel Splunk Enterprise Security We are equal opportunity/affirmative action employers, committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion More ❯
City Of Westminster, London, United Kingdom Hybrid / WFH Options
Track24 Limited
team to maintain security best practices. Containerisation & Orchestration: Deploy and manage containerised applications using Docker and other orchestration tools. Observability & Monitoring: Provision and maintain observability platforms such as DataDog, Splunk, or New Relic to gain monitoring and performance insights. Incident Management: Establish and oversee monitoring and incident management processes to ensure system reliability. Site Reliability Engineering (SRE): Perform SRE duties More ❯
years (Jr) 3-5 years (Mid) • A CompTIA Security+ or better security certification. • DoD Secret level security clearance. • One of the following certifications: Red Hat Certified System Administrator (RHCSA); Splunk Certified Administrator; SolarWinds Certified Professional (SCP); Arcsight; Elastic Stack; RedSeal; ACAS; Linux+; CEH; Microsoft365 Fundamentals, SolarWinds NetFlow Traffic Analyzer Secondary Skills - Nice to Haves Data analysis Job Description . Our More ❯
in a cyber lab environment - Must be able to work collaboratively across physical locations Desired Skills: • Experience leading and mentoring technical teams • Experience with Xacta and Continuum • Experience with Splunk, Tenable, Tanium and End Game -Experience with Net App Required Education: • BS Information Management, Cybersecurity, Computer Science or related degree. Two years of related work experience may be substituted for More ❯
working in a mission-critical or DoD/IC environment. Strong verbal and written communication skills; ability to interact with senior leadership. Familiarity with enterprise monitoring tools (e.g., SolarWinds, Splunk, Netcool, HP OpenView, etc.). Preferred Qualifications ITIL v4 Foundation certification or similar service management framework knowledge. Experience with enterprise ticketing systems such as ServiceNow or Remedy. Exposure to classified More ❯
working in a mission-critical or DoD/IC environment. Strong verbal and written communication skills; ability to interact with senior leadership. Familiarity with enterprise monitoring tools (e.g., SolarWinds, Splunk, Netcool, HP OpenView, etc.). Preferred Qualifications ITIL v4 Foundation certification or similar service management framework knowledge. Experience with enterprise ticketing systems such as ServiceNow or Remedy. Exposure to classified More ❯
systems and networks, to include creating trust levels of critical resources • system and application security threats and vulnerabilities of network topologies, Wi-Fi Networking, and TCP/IP protocols • Splunk (or other SIEMs) • Vulnerability scanning, assessment and monitoring tools such as Security Center, Nessus, and Endgame • MITRE Adversary Tactics, Techniques and Common Knowledge (ATT&CK) • Must be able to work More ❯
will have foundational knowledge of security principles and a strong interest in security operations, with hands-on experience or coursework involving Splunk. BASIC QUALIFICATIONS: Minimum of 1 year of Splunk/SOC experience. Bachelor's in a computer science related field Active Top Secret Clearance Ability and willingness to do shift work MAIN RESPONSIBILITIES: Responsible for monitoring computer networks for More ❯
/365 monitoring, analysis, and incident response capabilities. The role is responsible for strategic planning, resource management, and driving improvements to IT operations and service delivery. Top Skills: - Splunk/SOAR Experience - Leadership Experience - Endpoint Security Key Responsibilities: - Lead and manage the IT operations for NCSC, ensuring alignment with the overall NCSC mission and objectives. - Oversee the NCSC data centers More ❯
will have foundational knowledge of security principles and a strong interest in security operations, with hands-on experience or coursework involving Splunk. BASIC QUALIFICATIONS: Minimum of 5 year of Splunk/SOC experience. Bachelor's in a computer science related field Active Top Secret Clearance Ability and willingness to do shift work MAIN RESPONSIBILITIES: Responsible for monitoring computer networks for More ❯
support - working closely with the software development teams and system architects to provide essential primary support for all desktop software and hardware systems - using tools such as Jira, confluence, Splunk, WinDbg, Check_MK and Wireshark. Continuous evaluation and improvement of support procedures, development and implementation of required/agreed tools and associated runtime environments. Interact with various internal IT support More ❯
duties for the program's cybersecurity defense suite of tools, known as Cybersecurity Subsystem (CSS) Manage CSS accounts, accesses, and monitoring dashboards Provide Tier 1 troubleshooting for CSS tools (Splunk, DISA ACAS, DISA ESS) Provide CSSE support and expertise by: Preparing, maintaining and submitting the RMF-artifact delivery schedule (which includes identified RMF package delivery dates), as provided in the More ❯
appliances. (MX, EX, SRX) Experience with Session Initiation Protocol (SIP) implementation and design concepts. Experience with Ribbon Session Border Controllers (Client) Experience with SolarWinds configuration and maintenance. Experience with Splunk Experience with change, configuration and performance management NetOps concepts. IAT Level III Certification (i.e. CISSP or equivalent). Marathon TS is committed to the development of a creative, diverse and More ❯
Wireshark, Tshark, and tcpdump Experienced in analyzing network datasets, including Zeek and firewall logs, to support threat hunting and security investigations. Experienced in leveraging data analysis platforms, such as Splunk, Kibana, and Arkime, to detect and analyze anomalous network activity Proficient in triaging Suricata alerts, tuning rules, and creating custom detections. In-depth understanding of network vulnerabilities and misconfigurations Experience More ❯
baseline, system, and regression level testing in support of research and development efforts Desired: Knowledge of Jenkins or other Continuous Integration Frameworks Knowledge of PyTest automation frameworks Knowledge of SPLUNK Knowledge of working in a Linux environment Knowledge of working in an Agile environment Education/Experience: Bachelor's degree in Math, Science, Engineering, Statistics, Engineering Management, or a related More ❯