Average salary: $327,500 /yearly

More stats
Get new jobs by email
  •  ...CDN and caching strategies Experience with Redis and Kafka Familiarity with observability tools (Prometheus, Grafana, Datadog, Splunk) Experience with service mesh (Istio, Linkerd) Knowledge of SRE practices (SLIs, SLOs, error budgets) Strong communication... 
    Splunk

    Eitacies Inc

    Santa Clara, CA
    21 days ago
  •  ...environments and a robust understanding of alert triage. Responsibilities include evaluating alerts, conducting investigations, and using Splunk for log analysis. The role aims to shape future security response methodologies. If you are skilled in investigative judgment and... 
    Splunk
    Remote work

    Mercor Inc

    Oxnard, CA
    2 days ago
  •  ...their high-growth technology initiatives. The ideal candidate will have over 3 years as a SOC analyst and strong expertise in using Splunk for security investigations. Responsibilities include reviewing alerts, conducting thorough investigations, and mentoring fellow... 
    Splunk
    Remote work

    Mercor Inc

    Montclair, CA
    4 days ago
  •  ...Investigation Specialist in Murrieta, California. This role requires 3+ years of experience as a SOC analyst and substantial knowledge of Splunk for conducting investigations. Candidates will be responsible for evaluating SOC alerts, performing security investigations, and... 
    Splunk
    Remote work

    Mercor Inc

    Murrieta, CA
    1 day ago
  •  ...performing thorough investigations, and mentoring analysts. Candidates should have over 3 years of SOC analyst experience, strong Splunk skills, and the ability to make informed decisions under pressure. Enjoy a cutting-edge environment and collaborate with top security... 
    Splunk
    Remote work

    Mercor Inc

    Salinas, CA
    2 days ago
  •  ...driven investigation systems. The ideal candidate will have at least 3 years of experience as a SOC analyst, strong skills in using Splunk, and the ability to validate security investigations. Responsibilities include evaluating SOC alerts, performing detailed... 
    Splunk
    Remote work

    Mercor Inc

    Visalia, CA
    1 day ago
  •  ...including SIEM and endpoint systems. The ideal candidate will have at least 3 years of SOC analysis experience and proficiency in using Splunk for investigations. You'll collaborate with fellow experts and contribute to innovative SOC automation and AI-driven security... 
    Splunk
    Remote work

    Mercor Inc

    La Mesa, CA
    7 hours agonew
  •  ...Gentoro was founded by a team with deep experience in enterprise infrastructure and AI, with leadership roots at companies including Splunk, WebLogic, and Asurion. Gentoro helps organizations simplify AI integration into real-world systems, with the observability,... 
    Splunk
    Shift work

    Palm Venture Studios

    San Francisco, CA
    17 days ago
  •  ...investigations while applying real-world expertise to validate findings. Ideal candidates have 3+ years as a SOC analyst and strong command of Splunk for investigations. Join Mercor to work with experts on cutting-edge SOC automation and AI-driven systems. #J-18808-Ljbffr... 
    Splunk
    Remote work

    Mercor Inc

    Ontario, CA
    1 day ago
  •  ...endpoint, cloud, and identity environments. Candidates must have at least 3 years of SOC analyst experience and strong knowledge of Splunk. In this role, you will conduct significant investigations, assess various alerts, and mentor other analysts. Join Mercor to... 
    Splunk
    Remote work

    Mercor Inc

    Redlands, CA
    2 days ago
  •  ...to join its team in Diamond Bar, California. The ideal candidate will have 3+ years of hands-on SOC experience, particularly with Splunk, and will be responsible for conducting high-quality security investigations. This role includes evaluating SOC alerts, performing... 
    Splunk
    Remote work

    Mercor Inc

    Diamond Bar, CA
    2 days ago
  •  ...of hands-on experience as a SOC analyst, a strong understanding of incident investigation workflows, and mandatory experience with Splunk. Responsibilities include reviewing alerts, performing security investigations, and collaborating with experienced SOC practitioners... 
    Splunk
    Remote work

    Mercor Inc

    Fontana, CA
    1 day ago
  •  ...investigation systems. The ideal candidate will have over 3 years of hands-on experience as a SOC analyst and a strong command of Splunk for conducting investigations. Responsibilities include reviewing SOC alerts, performing investigations, and evaluating SOC investigations... 
    Splunk
    Remote work

    Mercor Inc

    Simi Valley, CA
    1 day ago
  •  ...involves reviewing and investigating security alerts and requires over 3 years of experience as a SOC analyst, particularly in using Splunk. The ideal candidate should possess strong analytical skills and demonstrate proficiency in incident investigation workflows. Join... 
    Splunk
    Remote work

    Mercor Inc

    Encinitas, CA
    23 hours ago
  •  ...systems in Palmdale, California. Ideal candidates should possess over 3 years of SOC analyst experience, highly proficient in using Splunk for investigations and alert triage. Responsibilities include reviewing SOC alerts, executing detailed security investigations, and... 
    Splunk
    Remote work

    Mercor Inc

    Palmdale, CA
    2 days ago
  •  ...systems. This position requires over 3 years of SOC analyst experience, strong investigative judgment, and hands-on expertise with Splunk for conducting investigations. The role involves reviewing SOC alerts, performing security investigations, and maintaining high-quality... 
    Splunk
    Remote work

    Mercor Inc

    Chino, CA
    3 days ago
  •  ...investigations across various environments. Key responsibilities include evaluating alerts, conducting thorough investigations, and utilizing Splunk for log analysis. Applicants should have strong investigative judgment and excellent documentation skills. Join Mercor to work with... 
    Splunk
    Remote work

    Mercor Inc

    Camarillo, CA
    2 days ago
  •  ...generation SOC automation and AI-driven investigation systems. The role requires over 3 years of SOC analyst experience, particularly with Splunk, for investigating alerts and validating evidence. Effective communication in English and strong analytical skills are essential.... 
    Splunk
    Remote work

    Mercor Inc

    Tulare, CA
    2 days ago
  •  ...Unix Bash, Network security, SSL, Customer focus Nice to have: Distributed Systems, Web Application Security and Cryptography, Splunk, Networking and Communication Protocols, Encryption/Decryption) Key Skills : Expertise in Java; architecture, design, development... 
    Splunk

    Info Way Solutions

    Fremont, CA
    2 days ago
  •  ...investigative judgment. Key responsibilities include reviewing and evaluating SOC alerts, performing end-to-end investigations, and using Splunk extensively. Candidates should have hands-on experience with SOC tools and a solid understanding of incident investigation... 
    Splunk
    Remote work

    Mercor Inc

    Newark, CA
    2 days ago
  •  ...investigation systems. The ideal candidate has over 3 years of SOC analyst experience, strong investigative judgment, and is proficient in Splunk. Key responsibilities include reviewing SOC alerts, conducting investigations, and mentoring teams. Join us to impact future... 
    Splunk
    Remote work

    Mercor Inc

    Martinez, CA
    3 days ago
  •  ...monitoring, alerting, error budgets, fault analysis, and automation. In-depth knowledge of monitoring and observability tools: Apache Splunk Knowledge of Linux operating system principles, networking fundamentals, and systems management Demonstrable fluency in at... 
    Splunk
    Local area
    Immediate start

    Donato Technologies Inc

    Sunnyvale, CA
    22 days ago
  •  ...Specialist in Hayward, California. The ideal candidate will have 3+ years as a SOC analyst, with expertise in investigating alerts using Splunk. This role involves reviewing SOC alerts, conducting end-to-end investigations, and documenting evidence. Strong communication... 
    Splunk
    Remote work

    Mercor Inc

    Hayward, CA
    4 days ago
  • $70 per hour

     ...Manage Jira Data Center & Cloud. Perform upgrades & migrations. Troubleshoot performance issues. Monitoring (NewRelic, Splunk). Integrations (GitHub, enterprise tools). Prepare for Jira Cloud migration. Requirements: ~5+ years Jira Data Center... 
    Splunk

    Covetit

    San Jose, CA
    23 hours ago
  •  ...California. This role requires 3+ years of experience as a SOC analyst, solid understanding of alert triage, and hands-on experience with Splunk. Responsibilities include evaluating SOC alerts, conducting thorough investigations, and mentoring other analysts. Ideal candidates... 
    Splunk
    Remote work

    Mercor Inc

    Eastvale, CA
    2 days ago
  •  ...judgment to ensure high-quality security outcomes. Candidates should have 3+ years of SOC analyst experience, strong skills in using Splunk, and a proven ability to assess the validity of investigations. This position offers the opportunity to work on cutting-edge SOC... 
    Splunk
    Remote work

    Mercor Inc

    Vacaville, CA
    2 days ago
  •  ...driven investigation systems. This role demands strong experience in security operations and investigative analysis, particularly using Splunk. Responsibilities include monitoring SOC alerts, performing investigations, and collaborating with other experts to maintain high... 
    Splunk
    Remote work

    Mercor Inc

    Ceres, CA
    4 days ago
  •  ...team in Berkeley, CA. The ideal candidate will have a minimum of three years of experience in a SOC environment, strong skills in Splunk for conducting investigations, and the ability to evaluate and validate security incidents effectively. This role involves hands-on... 
    Splunk
    Remote work

    Mercor Inc

    Berkeley, CA
    7 hours agonew
  •  ...investigations, evaluating SOC alerts, and mentoring other analysts. Candidates should have at least 3 years of experience and a solid understanding of Splunk. Join Mercor to work on impactful security cases and collaborate with top professionals in the field. #J-18808-Ljbffr... 
    Splunk
    Remote work

    Mercor Inc

    Union City, CA
    3 days ago
  •  ...hiring a SOC Investigation Specialist in Rancho Cucamonga, CA. This role involves handling high-quality security investigations using Splunk, assessing SOC alerts, and applying investigative judgment. Candidates should have over 3 years of SOC experience, strong... 
    Splunk
    Remote work

    Mercor Inc

    Rancho Cucamonga, CA
    1 day ago