Get new jobs by email
- ...Specialist in Chico, California. This role involves monitoring and evaluating SOC alerts, conducting security investigations using Splunk, and collaborating with SOC teams. The ideal candidate brings over 3 years of experience, strong investigative judgment, and excellent...Remote workSplunk
- ...Investigation Specialist in Portland, Oregon. This role involves reviewing and conducting security investigations, with a focus on using Splunk for alert triage and decision-making. Candidates should have 3+ years of experience in a production SOC environment and strong...Remote workSplunk
- ...experience in a production environment. Key responsibilities include reviewing SOC alerts, conducting detailed investigations, and using Splunk for analysis. The ideal candidate must possess strong investigative judgment, solid communication skills, and proficiency in SOC...Remote workSplunk
- ...driven investigation systems. Candidates should have 3+ years of SOC analyst experience, strong investigative judgment, and hands-on Splunk skills. Responsibilities include reviewing SOC alerts, conducting security investigations, and mentoring other analysts. Join a...Remote workSplunk
- ...Investigation Specialist in Surprise, Arizona. The role involves review and validation of SOC outputs, conducting investigations, using Splunk extensively for log analysis, and maintaining accurate documentation. Ideal candidates will have over 3 years of experience as a...Remote workSplunk
- ...environments and a robust understanding of alert triage. Responsibilities include evaluating alerts, conducting investigations, and using Splunk for log analysis. The role aims to shape future security response methodologies. If you are skilled in investigative judgment and...Remote workSplunk
- ...to enhance SOC automation and AI-driven investigations. The ideal candidate has over 3 years of SOC experience, strong expertise in Splunk, and the ability to analyze complex alerts and investigations. Responsibilities include evaluating SOC alerts, providing detailed...Remote workSplunk
- ...performing thorough investigations, and mentoring analysts. Candidates should have over 3 years of SOC analyst experience, strong Splunk skills, and the ability to make informed decisions under pressure. Enjoy a cutting-edge environment and collaborate with top security...Remote workSplunk
- ...their high-growth technology initiatives. The ideal candidate will have over 3 years as a SOC analyst and strong expertise in using Splunk for security investigations. Responsibilities include reviewing alerts, conducting thorough investigations, and mentoring fellow...Remote workSplunk
- ...perform detailed investigations, and maintain documentation. The ideal candidate has over 3 years in SOC analysis, excels in using Splunk, and has strong investigative judgment. This role offers the opportunity to collaborate with top-tier security professionals and influence...Remote workSplunk
- ...Newport Beach, California. This role focuses on reviewing and conducting investigations across various security environments utilizing Splunk extensively. The ideal applicant will have over 3 years of experience as a SOC analyst, demonstrating strong investigative judgment...Remote workSplunk
- ...high-growth technology efforts. This position requires 3+ years as a SOC analyst, strong investigative judgment, and proficiency in Splunk to evaluate alerts and conduct thorough investigations. The ideal candidate will collaborate with experts in cutting-edge SOC...Remote workSplunk
- ...to handle AI-driven investigations and SOC automation. Ideal candidates will have 3+ years of SOC experience and strong skills in Splunk, alert triage, and investigative judgment. The role involves monitoring alerts, conducting investigations, and documenting processes...Remote workSplunk
- ...years in a production SOC environment. Key responsibilities include reviewing SOC alerts, conducting detailed investigations using Splunk, and collaborating with other analysts to uphold investigation standards. Ideal candidates should possess strong investigative judgment...Remote workSplunk
- ...Specialist in Milford, Connecticut. This position demands over 3 years of SOC analyst experience, with a strong emphasis on utilizing Splunk for investigations. Responsibilities include evaluating SOC alerts, performing thorough investigations, and collaborating with...Remote workSplunk
- ...quality security investigations across various environments. The ideal candidate has over 3 years of SOC experience, is proficient in Splunk, and possesses strong investigative judgment. Responsibilities include evaluating SOC alerts and conducting thorough investigations...Remote workSplunk
- ...endpoint, cloud, and identity environments. Candidates must have at least 3 years of SOC analyst experience and strong knowledge of Splunk. In this role, you will conduct significant investigations, assess various alerts, and mentor other analysts. Join Mercor to...Remote workSplunk
- ...SOC Investigation Specialist in Bridgeport, Connecticut. This role demands over 3 years of SOC analyst experience, proficiency in Splunk for diverse security investigations, and a solid grasp of alert triage and incident workflows. Ideal candidates will combine technical...Remote workSplunk
- ...have over 3 years of hands-on SOC analyst experience, specialize in high-quality security investigations, and be skilled in using Splunk for log analysis. The role involves reviewing SOC alerts, performing comprehensive investigations, and collaborating with cybersecurity...Remote workSplunk
- ...role involves leveraging your skills as a SOC analyst to conduct thorough investigations and evaluations of security alerts using Splunk and other tools. Ideal candidates will have over three years of SOC experience, strong alert triage skills, and the ability to make...Remote workSplunk
- ...generation SOC automation and AI-driven investigation systems. The role requires over 3 years of SOC analyst experience, particularly with Splunk, for investigating alerts and validating evidence. Effective communication in English and strong analytical skills are essential....Remote workSplunk
- ...investigation systems. The ideal candidate will have over 3 years of hands-on experience as a SOC analyst and a strong command of Splunk for conducting investigations. Responsibilities include reviewing SOC alerts, performing investigations, and evaluating SOC investigations...Remote workSplunk
- ...alerts, performing end-to-end security investigations, and collaborating with teams to maintain high standards. Candidates should have strong Splunk expertise and be fluent in English. Join a cutting-edge team at Mercor to shape future security responses. #J-18808-Ljbffr...Remote workSplunk
- ...quality security investigations across various environments. Candidates should have over 3 years of SOC experience, be proficient in Splunk, and possess a strong understanding of incident investigation workflows. Join us to shape the future of security investigations as...Remote workSplunk
- ...conducting thorough investigations, and ensuring high-quality outcomes. Ideal candidates have over 3 years of experience, strong skills in Splunk, and can work effectively under pressure. Join a cutting-edge team focused on AI-driven security solutions. #J-18808-Ljbffr...Remote workSplunk
- ...involves reviewing and investigating security alerts and requires over 3 years of experience as a SOC analyst, particularly in using Splunk. The ideal candidate should possess strong analytical skills and demonstrate proficiency in incident investigation workflows. Join...Remote workSplunk
- ...systems. This position requires over 3 years of SOC analyst experience, strong investigative judgment, and hands-on expertise with Splunk for conducting investigations. The role involves reviewing SOC alerts, performing security investigations, and maintaining high-quality...Remote workSplunk
- ...join their team in Columbia Township, Missouri. The ideal candidate will possess strong investigative judgment and be proficient in Splunk for conducting security investigations. Responsibilities include evaluating SOC alerts, performing investigations, and...Remote workSplunk
- ...to join its team in Diamond Bar, California. The ideal candidate will have 3+ years of hands-on SOC experience, particularly with Splunk, and will be responsible for conducting high-quality security investigations. This role includes evaluating SOC alerts, performing...Remote workSplunk
- ...of hands-on experience as a SOC analyst, a strong understanding of incident investigation workflows, and mandatory experience with Splunk. Responsibilities include reviewing alerts, performing security investigations, and collaborating with experienced SOC practitioners...Remote workSplunk
