Reston, Virginia, United States Hybrid / WFH Options
RedKey Solutions
process. • Coordinate and monitor log analysis for managed services to ensure compliance with customer policies and security requirements. Basic Qualifications: • Expertise with at least one of the following tools: Splunk, HBSS/McAfee, Rapid7. • Proficiency in implementing and managing SIEM, end-point security (IDS/IPS, HBSS). • Strong knowledge of networking protocols (TCP/IP, LAN/WAN concepts More ❯
network security tools (e.g., Metasploit, Netcat, Nmap, iptables, BurpSuite, IDS, SELinux, etc.). • Experience monitoring threats via a SIEM console such as Solarwinds, Cisco Network Analysis Module (LogRhythm/Splunk preferred). • Experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs and IPS logs. • Well-versed in leveraging More ❯
micro-service architecture APIs * Good Infrastructure, app server(JBoss) and database knowledge * Active Director(AD) Authentication and Integration * Red Hat Enterprise LinUI (RHEL) * App Dynamics, ELK Elastic Search, Kibana, Splunk * Understanding of code quality & security gates (sonarqube etc.) * Amazon Web Services (AWS) Cloud Required Skills/Experience The ideal candidate will have the following: 1. Must be from support background More ❯
Salt, or Ansible in production environments. Experience with revision control source code repositories (Git, SVN, Mercurial, Perforce). Experience working with and delivering using Agile practices. Monitoring experience with Splunk, Elk, Kibana, Grafana, etc. Extensive knowledge of Cloud computing i.e. AWS, GovCloud, or similar. Experience with infrastructure development, or development and operations. Experience with automated testing. Strong interpersonal skills and More ❯
such as C#, Python, Perl, Java, C++ CICD tools such as Azure DevOps, GitHub Actions, Gitlab, Jenkins, TeamCity Scripting languages such as PowerShell, bash Observability/Monitoring: Prometheus, Grafana, Splunk Containerisation tools such as Docker, K8S, OpenShift, EC, containers Hosting technologies such as IIS, nginx, Apache, App Service, LightSail Analytical and creative approach to problem solving We encourage you to More ❯
network devices and infrastructure Hands on experience with ELK, InfoVista, and Network Performance Monitoring applications. Knowledge and use of NetSecOps technologies including git, Gitlab CI/CD, Ansible, Terraform, Splunk, and network element managers Demonstrate expertise in management and monitoring of complex and geographically enterprise networks. Expert knowledge of US Army security requirements for network infrastructure. Original Posting: May More ❯
Preferred Qualifications: • Experience in identity management and governance concepts (single sign-on, identity federation). • Familiarity with web development frameworks (React, Redux). • Expertise in using analytics tools (Elasticsearch, Splunk) and creating interactive visualizations. • Knowledge of ICAM concepts/standards (LDAP, PKI, OAuth 2.0, SAML, MFA). More ❯
Reston, Virginia, United States Hybrid / WFH Options
NTT DATA Federal Services, Inc
the past 3 years) with Azure Cloud Computing. - Experience supporting any or all these products or technologies: Red Hat Satellite, Nagios, ForeScout, CyberArk, Layer7 PAM, SailPoint, Ansible, Puppet, Chef, Splunk, AMQP (RabbitMQ), Nessus suit, Swimlane, Qualys, SCCM/MECM, BigFix, MDM solutions, JIRA Where required by law, NTT DATA provides a reasonable range of compensation for specific roles. The starting More ❯
SRE), or a similar role. Proficiency in cloud platforms (AWS, Azure, GCP) and associated reliability tools. Hands-on experience with monitoring and logging tools such as Prometheus, Grafana, Datadog, Splunk, or ELK stack. Proficiency in scripting languages like Python, Bash, or Go for automation. Familiarity with containerization and orchestration tools (Docker, Kubernetes). Strong understanding of distributed systems, fault tolerant More ❯
tools like Helm, Kustomize and ArgoCD for microservice orchestration. • Detailed understanding of Cloud Foundry architecture and development methodology. • Systems Administration and/or Cloud certifications a plus. • Knowledge of Splunk or similar SIEM Platform. ADDITIONAL REQUIREMENTS • BA/BS Degree is required. Ideally in Computer Science, Cyber Security, Information Security, Engineering, Information Technology. MA/MS Preferred. Note: The job More ❯
for Cloud, Storage (SQL) and CSPM. Proficient with Data loss prevention tools experience, such as MS Purview Compliance Manager and Tessian Security monitoring, SIEM tooling such as Exabeam, QRadar, Splunk and Sentinel. Experience with Azure (security centre) and M365 cloud infrastructure and configuration and on-premises Active Directory Experience in Cloud email security gateway services, Microsoft Exchange Online, Mimecast and More ❯
as NIST 800-207 Experience with ICAM principles and technologies such as multi-factor authentication or privileged access management Experience with Security Information and Event Management ( SIEM ) systems, including Splunk, Elastic, Logstash, or Kibana Knowledge of data broker technologies such as Cribl, Confluent, Operating Systems Security Events, including Windows or Linux, and networking protocols, including TCP/IP, DNS, DHCP More ❯
systems: OpenStack, OpenShift, Docker, Kubernetes, Microsoft Azure, and Amazon Web Services Application servers: Node.js, Oracle Weblogic, Oracle Glassfish, JBoss and Apache Tomcat Data environments: Oracle, Sybase, PostGreSQL, MySQL, MongoDB, Splunk, and Elasticsearch/Logstash/Kibana (ELK), Neo4j Operating system environments: Windows, Linux, and MacOS Software requirements management: Atlassian Suite, EPICS, Story Board Data Science: Statistical Analysis, Data Visualization, Graph More ❯
tools such as Cloudformation, AWS CDK, Ansible to automate infrastructure provisioning, environment setup and software deployment Experience implementing system monitoring and alerting using tools such as Cloudwatch, Appdynamics, Kibana, Splunk or Prometheus Experience with one or more Public/Private cloud offerings and with Virtualisation Technologies Knowledge of RESTful APIs, how to consume them and how to invoke/engage More ❯
incident response. Key Responsibilities - Manage and monitor AWS infrastructure for performance and security - Respond to production incidents, perform root cause analysis, and implement fixes - Maintain observability tools (Prometheus, Grafana, Splunk) and write PromQL queries - Improve and operate CI/CD pipelines using GitHub Actions and Kubernetes - Automate infrastructure tasks with Python, Bash, Go or SQL - Work with Git-based workflows … call rotation to ensure system reliability Your Profile Essential: - Solid hands-on AWS experience in a DevOps setting - Background in incident, change, and problem management - Strong with Prometheus, Grafana, Splunk, and PromQL - Proficient in scripting (Python, Go, Bash, SQL) - Skilled in GitHub, CI/CD, and Kubernetes operations Desirable: - Experience with Terraform or CloudFormation - Advanced log analysis with Splunk - Strong More ❯
in computer science, Information Technology, or a related field, or equivalent work experience Five years of experience in developing, implementing, and managing SIEM correlation rules and content (such as Splunk, ArcSight, Kibana, LogRhythm) Experience with writing audit log parsers for SIEM data structures such as ArcSight's CEF or Splunk's SPL Advanced knowledge of TCP/IP (Transport protocols … understanding, documenting, communicating, and presenting technical issues in a non-technical manner to audiences with varying degrees of technical expertise Preferred qualifications: Highly Preferred to have an Active SCI Splunk Enterprise Security Admin, Splunk Certified Developer certification Extensive experience with User activity monitoring (UAM) ,User Entity Behavior Analytics (UEBA) and DLP tools Expertise in developing Insider Threat trigger policies Investigate More ❯
Cheltenham, England, United Kingdom Hybrid / WFH Options
Searchability NS&D
to start – must be active (West) Globally leading defence/cyber security company Up to £65k DoE - plus benefits and bonuses Cheltenham location – hybrid working model Experience required in Splunk/ELK, Linux, Apache NiFi, Java/Python, Docker/Kubernetes Who Are We? We are recruiting a Senior Support Engineer to work with a multi-national, industry-leading cyber … enhanced DV Clearance (West) Willing to work full-time on-site in Cheltenham when required. Proven experience supporting and debugging complex live systems, including log monitoring with tools like Splunk or the ELK stack. Strong ability to manage tasks proactively while adapting to shifting priorities. Proficiency in Linux server administration. Experience with technologies such as Apache NiFi, MinIO, and AWS … you. SENIOR SUPPORT ENGINEER KEY SKILLS: SUPPORT ENGINEER/LINUX/UNIX/AWS/DOCKER/KUBERNETES/PYTHON/ANSIBLE/JAVA/ELK/APACHE/SPLUNK/APACHE NIFI/DV CLEARED/DV CLEARANCE/DEVELOPED VETTING/DEVELOPED VETTED/DEEP VETTING/DEEP VETTED/CHELTENHAM/SECURITY CLEARED/SECURITY CLEARANCE More ❯
Herndon, Virginia, United States Hybrid / WFH Options
The DarkStar Group
development lifecycle (SDLC). Work closely with software developers and cloud engineers to integrate security and automation into the software development lifecycle. Support AWS CloudWatch, AWS Security Hub, GuardDuty, SPLUNK, or ELK for proactive monitoring, logging, and compliance reporting. Manage multiple SPLUNK environments and create SPLUNK queries and dashboards as needed. Participate in security testing, audits, and incident response activities. More ❯