Average salary: $327,500 /yearly
More statsGet new jobs by email
- ...CDN and caching strategies Experience with Redis and Kafka Familiarity with observability tools (Prometheus, Grafana, Datadog, Splunk) Experience with service mesh (Istio, Linkerd) Knowledge of SRE practices (SLIs, SLOs, error budgets) Strong communication...Splunk
- ...environments and a robust understanding of alert triage. Responsibilities include evaluating alerts, conducting investigations, and using Splunk for log analysis. The role aims to shape future security response methodologies. If you are skilled in investigative judgment and...SplunkRemote work
- ...their high-growth technology initiatives. The ideal candidate will have over 3 years as a SOC analyst and strong expertise in using Splunk for security investigations. Responsibilities include reviewing alerts, conducting thorough investigations, and mentoring fellow...SplunkRemote work
- ...Investigation Specialist in Murrieta, California. This role requires 3+ years of experience as a SOC analyst and substantial knowledge of Splunk for conducting investigations. Candidates will be responsible for evaluating SOC alerts, performing security investigations, and...SplunkRemote work
- ...performing thorough investigations, and mentoring analysts. Candidates should have over 3 years of SOC analyst experience, strong Splunk skills, and the ability to make informed decisions under pressure. Enjoy a cutting-edge environment and collaborate with top security...SplunkRemote work
- ...driven investigation systems. The ideal candidate will have at least 3 years of experience as a SOC analyst, strong skills in using Splunk, and the ability to validate security investigations. Responsibilities include evaluating SOC alerts, performing detailed...SplunkRemote work
- ...including SIEM and endpoint systems. The ideal candidate will have at least 3 years of SOC analysis experience and proficiency in using Splunk for investigations. You'll collaborate with fellow experts and contribute to innovative SOC automation and AI-driven security...SplunkRemote work
- ...Gentoro was founded by a team with deep experience in enterprise infrastructure and AI, with leadership roots at companies including Splunk, WebLogic, and Asurion. Gentoro helps organizations simplify AI integration into real-world systems, with the observability,...SplunkShift work
- ...investigations while applying real-world expertise to validate findings. Ideal candidates have 3+ years as a SOC analyst and strong command of Splunk for investigations. Join Mercor to work with experts on cutting-edge SOC automation and AI-driven systems. #J-18808-Ljbffr...SplunkRemote work
- ...endpoint, cloud, and identity environments. Candidates must have at least 3 years of SOC analyst experience and strong knowledge of Splunk. In this role, you will conduct significant investigations, assess various alerts, and mentor other analysts. Join Mercor to...SplunkRemote work
- ...to join its team in Diamond Bar, California. The ideal candidate will have 3+ years of hands-on SOC experience, particularly with Splunk, and will be responsible for conducting high-quality security investigations. This role includes evaluating SOC alerts, performing...SplunkRemote work
- ...of hands-on experience as a SOC analyst, a strong understanding of incident investigation workflows, and mandatory experience with Splunk. Responsibilities include reviewing alerts, performing security investigations, and collaborating with experienced SOC practitioners...SplunkRemote work
- ...investigation systems. The ideal candidate will have over 3 years of hands-on experience as a SOC analyst and a strong command of Splunk for conducting investigations. Responsibilities include reviewing SOC alerts, performing investigations, and evaluating SOC investigations...SplunkRemote work
- ...involves reviewing and investigating security alerts and requires over 3 years of experience as a SOC analyst, particularly in using Splunk. The ideal candidate should possess strong analytical skills and demonstrate proficiency in incident investigation workflows. Join...SplunkRemote work
- ...systems in Palmdale, California. Ideal candidates should possess over 3 years of SOC analyst experience, highly proficient in using Splunk for investigations and alert triage. Responsibilities include reviewing SOC alerts, executing detailed security investigations, and...SplunkRemote work
- ...systems. This position requires over 3 years of SOC analyst experience, strong investigative judgment, and hands-on expertise with Splunk for conducting investigations. The role involves reviewing SOC alerts, performing security investigations, and maintaining high-quality...SplunkRemote work
- ...investigations across various environments. Key responsibilities include evaluating alerts, conducting thorough investigations, and utilizing Splunk for log analysis. Applicants should have strong investigative judgment and excellent documentation skills. Join Mercor to work with...SplunkRemote work
- ...generation SOC automation and AI-driven investigation systems. The role requires over 3 years of SOC analyst experience, particularly with Splunk, for investigating alerts and validating evidence. Effective communication in English and strong analytical skills are essential....SplunkRemote work
- ...Unix Bash, Network security, SSL, Customer focus Nice to have: Distributed Systems, Web Application Security and Cryptography, Splunk, Networking and Communication Protocols, Encryption/Decryption) Key Skills : Expertise in Java; architecture, design, development...Splunk
- ...investigative judgment. Key responsibilities include reviewing and evaluating SOC alerts, performing end-to-end investigations, and using Splunk extensively. Candidates should have hands-on experience with SOC tools and a solid understanding of incident investigation...SplunkRemote work
- ...investigation systems. The ideal candidate has over 3 years of SOC analyst experience, strong investigative judgment, and is proficient in Splunk. Key responsibilities include reviewing SOC alerts, conducting investigations, and mentoring teams. Join us to impact future...SplunkRemote work
- ...monitoring, alerting, error budgets, fault analysis, and automation. In-depth knowledge of monitoring and observability tools: Apache Splunk Knowledge of Linux operating system principles, networking fundamentals, and systems management Demonstrable fluency in at...SplunkLocal areaImmediate start
- ...Specialist in Hayward, California. The ideal candidate will have 3+ years as a SOC analyst, with expertise in investigating alerts using Splunk. This role involves reviewing SOC alerts, conducting end-to-end investigations, and documenting evidence. Strong communication...SplunkRemote work
$70 per hour
...Manage Jira Data Center & Cloud. Perform upgrades & migrations. Troubleshoot performance issues. Monitoring (NewRelic, Splunk). Integrations (GitHub, enterprise tools). Prepare for Jira Cloud migration. Requirements: ~5+ years Jira Data Center...Splunk- ...California. This role requires 3+ years of experience as a SOC analyst, solid understanding of alert triage, and hands-on experience with Splunk. Responsibilities include evaluating SOC alerts, conducting thorough investigations, and mentoring other analysts. Ideal candidates...SplunkRemote work
- ...judgment to ensure high-quality security outcomes. Candidates should have 3+ years of SOC analyst experience, strong skills in using Splunk, and a proven ability to assess the validity of investigations. This position offers the opportunity to work on cutting-edge SOC...SplunkRemote work
- ...driven investigation systems. This role demands strong experience in security operations and investigative analysis, particularly using Splunk. Responsibilities include monitoring SOC alerts, performing investigations, and collaborating with other experts to maintain high...SplunkRemote work
- ...team in Berkeley, CA. The ideal candidate will have a minimum of three years of experience in a SOC environment, strong skills in Splunk for conducting investigations, and the ability to evaluate and validate security incidents effectively. This role involves hands-on...SplunkRemote work
- ...investigations, evaluating SOC alerts, and mentoring other analysts. Candidates should have at least 3 years of experience and a solid understanding of Splunk. Join Mercor to work on impactful security cases and collaborate with top professionals in the field. #J-18808-Ljbffr...SplunkRemote work
- ...hiring a SOC Investigation Specialist in Rancho Cucamonga, CA. This role involves handling high-quality security investigations using Splunk, assessing SOC alerts, and applying investigative judgment. Candidates should have over 3 years of SOC experience, strong...SplunkRemote work

