Overview Credence is one of the largest privately held technologies services company in the country, repeatedly recognized as a top place to work, and have been on the Inc. 5000 Fastest Growing Private Companies list for the last 12 years. We practice servant leadership and believe that by focusing on the success of our clients, team members, and partners, we all achieve greater success. At Credence, we support our clients’ mission-critical needs, powered by technology. We provide cutting-edge solutions, including AI/ML, enterprise modernization, and advanced intelligence capabilities, to the largest defense and health federal organizations. Through partnership and trust, we increase mission success for warfighters and secure our nation for a better future. Position Summary We have an upcoming need for a Splunk Engineer to design, implement, deploy, and manage complex Splunk environments for a highly complex Department of State organization. This role will be on-boarding this fall. You will customize Splunk to meet specific use cases and requirements. You will develop and maintain Splunk dashboards and create reports tailored to the needs of different teams and stakeholders. You will be in charge of monitoring indexing performance, search performance, and data ingest. You will have to be proactive in identifying and resolving Splunk system and performance issues. You will analyze and conduct research to determine a cyber criminal’s capabilities, intentions, and attack approaches, including those with multiple phases. In addition, you will be responsible for supporting the remediation of any discovered threats, and providing incident response capabilities when necessary. This role will require you to stay up-to-date with the latest Splunk features, enhancements, and industry trends and manage relationships with Splunk vendors to stay informed about new products and offerings. Responsibilities include, but are not limited to the duties listed below Create, manage, and support automation solutions for Splunk orchestration Use the SIEM, EDR, IDS, and other tools to conduct cyber threat hunts Rapidly respond to incidents to minimize risk exposure and ensure system availability; proactively monitor internal and external-facing environments Identify attacker tools, tactics, and procedures to develop indicators of compromise. Form and articulate expert opinions based on findings and analysis Seek opportunities to automate detection and remediation and reduce response times for incidents Provide incident response support and coordination, including investigating security incidents and coordinating with other teams to contain and remediate the incident. Leverage Splunk to create advanced search queries and reports to monitor system performance, security threats, and operational metrics. Collaborate and support inquiries from cross-functional internal and external stakeholders such as system administrators, compliance, and data engineering teams, to ensure documentation is complete and in compliance with information security policies Manage and support the development of security operations playbooks to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats Evaluate third-party products and services to verify they meet security and compliance requirements Familiarity with log management, event correlation, and data analysis concepts. Drive improvements in technical architecture, standards, and processes to meet company objectives and best security practices Develops technical solutions to verify compliance with required technical controls autonomously Present findings/reports to stakeholders on a weekly basis Perform log analysis, parsing, indexing, and analyzing machine data logs to extract actionable insights. Perform upgrades and patch management to keep Splunk environments up-to-date and secure. Design intuitive and customizable dashboards to visualize data trends. Education, Requirements and Qualifications Must be a US Citizen with the ability to obtain and maintain a Secret clearance. Active Secret Clearance preferred Masters Degree from an accredited university or equivalent combination of education in Computer Science, Information Technology, or a related field with 5 to 7 years of experience Equivalent combination of education, technical training and certification (CISSP, C|EH, GIAC GREM, GCTI, GCFR, GCFA, Splunk Certified Cybersecurity Defense Analyst, Splunk Enterprise Security Certified Admin) and/or work experience; knowledgeable about configuring Splunk for security and compliance requirements, including FISMA, SOC 2, HIPAA, and GDPR. Experience in building Splunk Technology Add-ons and configuring field extractions for various data sources Strong experience working with Splunk, including architecting and implementing Splunk solutions in large-scale environments. Proficiency in SPL (Search Processing Language) for creating complex queries, reports, and dashboards in Splunk. Experience in designing, developing, testing, troubleshooting, deploying, and maintaining Splunk solutions, reporting, alerting, and dashboards Extensive knowledge of a tier Splunk installation: indexers, forwarders, search heads, clusters Experience analyzing system, network, and application logs for attack techniques at all stages of the cyber kill chain Experience with more than one or more enterprise-scale EDR and SIEM tool Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways. Strong analytical and critical thinking skills to identify and address complex data and system issues. Strong problem-solving skills to investigate and resolve Splunk platform and data ingestion issues. Strong communicator and collaborator, able to work closely with cross-functional teams. Knowledgeable in using scripting languages (e.g., Python) and Splunk's built-in scripting to automate routine tasks. Detail-oriented with a strong commitment to documenting configurations, processes, and best practices. Familiarity with ServiceNow cloud offering and log ingestion to Splunk. Working Conditions and Physical Requirements Please join us, as together we build a better world one mission at a time powered by Technology and its People! This position is onsite in Rosslyn VA.
...Job Description Marine Structural Welder Aluminum Core Welding Skills both GMAW & GTAW GMAW (Pulse / Spray) All Positions Must be able to perform argon-purged open root GMAW welds. Capable of producing X-Ray (RT) quality welds in all positions....
...systems in the AI era. This role reports to our Deputy General Counsel.This role will:Own legal strategy and risk management for OpenAI... ..., sex, sexual orientation, age, veteran status, disability, genetic information, or other applicable legally protected characteristic...
...Job Description Job Description Lab Assistant Alternate Job Titles Laboratory Technician Medical Lab Assistant Clinical... ...Complete relevant training and competency documentation Required Experience High school diploma or equivalent No prior experience...
...Job Description Please note, this position is located at Winter Park Resort in Winter Park, CO. Seasonal (Seasonal) Who We Are: At 67 miles away, Winter Park is the closest ski resort to Denver. With easy access to 765,000 acres of public land, Winter Park is...
...Director of IT / CIO About the Company Reputable national defense litigation firm Industry Law Practice Type Partnership Founded 1963 Employees 201-500 Specialties appellate product liability litigation toxic tort litigation environmental...