S, DNS, SSH, SMTP, SMB, NFS, etc. In-depth knowledge and experience of Wifi networking In-depth knowledge and experience of network topologies DMZ, WANs, etc. Substantial knowledge of Splunk (or other SIEM's) Understanding of MITRE Adversary Tactics, Techniques and Common Knowledge (ATT&CK) Knowledge of Computer Network Defense policies, procedures, and regulations Knowledge of defense-in-depth principles More ❯
of required security controls; and implementing continuous monitoring and auditing of solutions for compliance with security controls. Strong skills in specifying and implementing log collection into tools such as Splunk, and performing querying and analysis of aggregated logs to identify security-relevant anomalies or risks Strong experience in implementing security controls from government regulatory frameworks and security standards (e.g., NIST More ❯
SMB, NFS, TCP/IP In depth knowledge and experience of Wifi networking In depth knowledge and experience of network topologies DMZ's, WAN's, etc. Substantial knowledge of Splunk (or other SIEM's) Understanding of MITRE Adversary Tactics, Techniques and Common Knowledge (ATT&CK) Knowledge of Computer Network Defense policies, procedures, and regulations Knowledge of defense-in-depth principles More ❯
Wireshark, Tshark, and tcpdump Experienced in analyzing network datasets, including Zeek and firewall logs, to support threat hunting and security investigations. Experienced in leveraging data analysis platforms, such as Splunk, Kibana, and Arkime, to detect and analyze anomalous network activity Proficient in triaging Suricata alerts, tuning rules, and creating custom detections. In-depth understanding of network vulnerabilities and misconfigurations Experience More ❯
must be able to access and use specified databases. TS/SCI with CI Poly Preferred Qualifications Experience with CPE, BLUESTEELE, CARS, DX, FOREMAN, GATEKEEPER, GRAPEVINE, WRANGLER, ArcGIS, ARCMap, Splunk, Palantir, and other IC tools and services. Company EEO Statement Accessibility/Accommodation: If because of a medical condition or disability you need a reasonable accommodation for any part of More ❯
baseline, system, and regression level testing in support of research and development efforts Desired: Knowledge of Jenkins or other Continuous Integration Frameworks Knowledge of PyTest automation frameworks Knowledge of SPLUNK Knowledge of working in a Linux environment Knowledge of working in an Agile environment Education/Experience: Bachelor's degree in Math, Science, Engineering, Statistics, Engineering Management, or a related More ❯
prioritize in a fast-moving environment with ahigh sense of urgency and self-motivation Desired Qualifications: • Experience with managing work tasks via ServiceNow • Experience with enterprise technologies such as Splunk and Amazon Cloud services • Experience with virtual infrastructure and containerization allspark - What You Can Expect: A culture of integrity. At CACI, we place character and innovation at the center of More ❯
seek out vendor offered (paid) training opportunities like conferences, certification courses and seminars. Conferences (recently attended by Praxis employees): AWS Summit, IoT World, Black Hat and DefCon. Training & Certifications: Splunk, AWS, Big Data/Cloudera, VMWare, Scrum Master the list of certifications goes on and on! Praxis University: Cyber Research, Data Analytics, IoT, AWS and RedHat course offerings and hands More ❯
seek out vendor offered (paid) training opportunities like conferences, certification courses and seminars. Conferences (recently attended by Praxis employees): AWS Summit, IoT World, Black Hat and DefCon. Training & Certifications: Splunk, AWS, Big Data/Cloudera, VMWare, Scrum Master the list of certifications goes on and on! Praxis University: Cyber Research, Data Analytics, IoT, AWS and RedHat course offerings and hands More ❯
have taken an A&A package through the RMF process using eMASS Must have technical certification or 2 years' experience with McAfee Endpoint Security, Assured Compliance Assessment Solution (ACAS), Splunk, and/or experience implementing network/enclave/system security toolsets with experience reviewing technical assessment reports and prioritizing technical corrective actions. Must achieve certification in required tools within More ❯
IPS, Full Packet Capture, Network Forensics, and complex technical reports on analytic findings • Experience using Assured Compliance Assessment (ACAS) suite of tools Knowledge of query language such as SPL (Splunk) or KQL (Sentinel). Understanding of malware analysis concepts and methods. Education/Certifications: Bachelor's degree in Computer Science or related field DoD 8140 Compliant for IAT Level II More ❯
systems A&A documents to unique environments and requirements Successfully work through POAMs with Developers, Engineers, and various groups Conduct the full spectrum system Continuous Monitoring Experienced user of Splunk, Rapid7, and other monitoring and auditing systems or software Conduct various roles and responsibilities in Cloud computing environment Ensure the system security documentation, is developed, maintained, reviewed, and updated on More ❯
with Debuggers, Disassemblers, Unpacking Tools, and Binary analysis tools. Experience with static and dynamic malware analysis tools and techniques. Ability to identify remediation steps for cybersecurity events. Experience with Splunk and EDR tools such as Microsoft Defender for Endpoint (MDE), Tanium. Ability to analyze a variety of Operating System log types. Experience in the development of policies and procedures to More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Lockheed Martin
operating systems Demonstrated technical experience with classified systems and networks Desired Skills: Strong understanding of security principles and practices Knowledge of DD254 and its requirements Working knowledge of Nessus, Splunk, qmulos Q-Audit and Q-Compliance Knowledge of security metrics and data analysis Familiarity with Change Control Board (CCB) processes Experience working with senior leadership to incorporate enhancements to Security More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Lockheed Martin
operating systems Demonstrated technical experience with classified systems and networks Desired Skills: Strong understanding of security principles and practices Knowledge of DD254 and its requirements Working knowledge of Nessus, Splunk, qmulos Q-Audit and Q-Compliance Knowledge of security metrics and data analysis Familiarity with Change Control Board (CCB) processes Experience working with senior leadership to incorporate enhancements to Security More ❯
have taken an A&A package through the RMF process using eMASS Must have technical certification or 3 years' experience with McAfee Endpoint Security, Assured Compliance Assessment Solution (ACAS), Splunk, and/or experience implementing network/enclave/system security toolsets with experience reviewing technical assessment reports and prioritizing technical corrective actions. Must achieve certification in required tools within More ❯
SCI with appropriate poly Exposure to CentOS/RHEL, VMware Horizon, secure DNS. Candidates should be familiar with systems monitoring tools such as Nagios and Grafana, data processing using Splunk, and basic command-line scripting. Knowledge of Virtual Desktop Infrastructure (VDI) principles is a plus. 1-5 years experience in help desk, account management and desktop system administration or a More ❯
it to Cisco for $3.7B. We're backed with $425M in venture financing from top-tier VC and strategic firms, including J.P. Morgan, Capital One Ventures, Citi Ventures, ServiceNow, Splunk Ventures, Norwest Venture Partners, Adage Capital Partners, Balyasny Asset Management, Gaingels, Harmonic Growth Partners, Menlo Ventures, IVP, Unusual Ventures, GV (formerly Google Ventures), Alkeon Capital, Battery Ventures, Sorenson Capital, Thomvest More ❯
Active DoD Top Secret clearance IAT Level II certification and CSSP Analyst certification (Security+ CE or better, CEH or better) Computing Environment certification desired (Windows 2016, Red Hat security, Splunk Power User etc.)< this should be moved to desired Experience with open source research, analyzing network traffic, analyzing windows logs, experience with network and host based security systems, experience with More ❯
San Diego, California, United States Hybrid / WFH Options
Noblis
WAN, Secure Cloud Edge, and IPv6 Networking. Familiarity with next-gen firewalls (Palo Alto, Zscaler, Cisco Firepower). Hands-on experience with AI-driven network monitoring solutions such as Splunk, Dynatrace, or Gigamon. Industry certifications such as CCNP or equivalent. Familiarity with NEN, ONE-NET, NMCI, or similar Navy IT environments. Overview Noblis and our wholly owned subsidiaries, Noblis ESI More ❯
and process automation using ServiceNow Orchestration. Understand ITIL/ITSM processes. Understand HTML, CSS, JavaScript, and other web technologies. Must be knowledgeable in the support and development of ServiceNow, Splunk, Nlyte, VMware, Ansible, etc. Required Clearance: Clearable. Ability to obtain/maintain TS/SCI with polygraph. (clearable) (.sci) () Required Qualifications: Five (5) years of experience as a Developer in More ❯
of required security controls; and implementing continuous monitoring and auditing of solutions for compliance with security controls. Strong skills in specifying and implementing log collection into tools such as Splunk, and performing querying and analysis of aggregated logs to identify security-relevant anomalies or risks Strong experience in implementing security controls from government regulatory frameworks and security standards (e.g., NIST More ❯
of required security controls; and implementing continuous monitoring and auditing of solutions for compliance with security controls. Strong skills in specifying and implementing log collection into tools such as Splunk, and performing querying and analysis of aggregated logs to identify security-relevant anomalies or risks Strong experience in implementing security controls from government regulatory frameworks and security standards (e.g., NIST More ❯
seek out vendor offered (paid) training opportunities like conferences, certification courses and seminars. Conferences (recently attended by Praxis employees): AWS Summit, IoT World, Black Hat and DefCon. Training & Certifications: Splunk, AWS, Big Data/Cloudera, VMWare, Scrum Master the list of certifications goes on and on! Praxis University: Cyber Research, Data Analytics, IoT, AWS and RedHat course offerings and hands More ❯
seek out vendor offered (paid) training opportunities like conferences, certification courses and seminars. Conferences (recently attended by Praxis employees): AWS Summit, IoT World, Black Hat and DefCon. Training & Certifications: Splunk, AWS, Big Data/Cloudera, VMWare, Scrum Master the list of certifications goes on and on! Praxis University: Cyber Research, Data Analytics, IoT, AWS and RedHat course offerings and hands More ❯