Average salary: $187,982 /yearly
More statsGet new jobs by email
$95k - $100k
...various data formats and related technologies for testing SQL Server and SQL Server Management Studio is a plus. Experience with Splunk analytics for validating technical fixes and updates in the app code/config. POS system experience is a plus. Nice to have...SplunkLocal areaRelocation$75 per hour
...mortems, capacity plans, cost reports, SRE review decks, and email threads. Represent platforms like HashiCorp Terraform , Datadog/Splunk , GitHub Actions , and Okta . Design multi-step tasks grounded in your real workflows. Require navigation of multiple apps,...SplunkHourly payFull timeContract workFor contractorsSummer workRemote work- ...beneficial. OpenSearch & Analytics Stack Working knowledge of OpenSearch or a comparable search/analytics stack (Elasticsearch, Splunk, etc.): indexing basics, dashboard creation, and query writing. Experience setting up or supporting analytics/observability...SplunkRemote work
- ...BE COMFORTABLE WORKING IN HYBRID MODEL 2-3 DAYS ONSITE OR 2-3 DAYS REMOTE Experience with monitoring tools such as AWS CloudWatch, App Dynamics, New Relic, Grafana, and Splunk to troubleshoot issues end-to-end as well as set up health checks, alerts, and triggers....SplunkRemote work
- ...Tier I NOC Technician Disaster Recovery Specialist Active Directory Administrator Release and Deployment SCCM Engineer Splunk SIEM Security Engineer Security Engineer Azure Cloud Engineer VMware/Azure Administrator Many of the roles will require...SplunkFull timeContract workTemporary workLocal areaNight shift
- ...reusable patterns. Build and maintain dashboards and alerting using monitoring platforms such as Datadog, Prometheus, Grafana, or Splunk. Support disaster recovery operations, including Zerto replication and Rubrik backup infrastructure. Participate in incident...SplunkWork at officeLocal areaImmediate startRemote work3 days per week
- ...Job : Splunk Engineer Location : 12 Months Location : REMOTE Responsibilities Manage day-to-day administration and operations of the Splunk platform Support platform lifecycle management, upgrades, patching, and vulnerability remediation...SplunkRemote work
- ...security alerts in a high-growth environment. Ideal candidates will have over 3 years of SOC analyst experience, strong skills in Splunk, and a deep understanding of incident workflows. This role offers the chance to work with advanced SOC automation systems and contribute...SplunkRemote work
- ...Specialist in Chico, California. This role involves monitoring and evaluating SOC alerts, conducting security investigations using Splunk, and collaborating with SOC teams. The ideal candidate brings over 3 years of experience, strong investigative judgment, and excellent...SplunkRemote work
- ...Investigation Specialist in Surprise, Arizona. The role involves review and validation of SOC outputs, conducting investigations, using Splunk extensively for log analysis, and maintaining accurate documentation. Ideal candidates will have over 3 years of experience as a...SplunkRemote work
- ...environments and a robust understanding of alert triage. Responsibilities include evaluating alerts, conducting investigations, and using Splunk for log analysis. The role aims to shape future security response methodologies. If you are skilled in investigative judgment and...SplunkRemote work
- ...experience in a production environment. Key responsibilities include reviewing SOC alerts, conducting detailed investigations, and using Splunk for analysis. The ideal candidate must possess strong investigative judgment, solid communication skills, and proficiency in SOC...SplunkRemote work
- ...driven investigation systems. Candidates should have 3+ years of SOC analyst experience, strong investigative judgment, and hands-on Splunk skills. Responsibilities include reviewing SOC alerts, conducting security investigations, and mentoring other analysts. Join a...SplunkRemote work
- ...SOC automation and AI-driven investigation systems. This role requires 3+ years of experience as a SOC analyst and strong skills in Splunk. Responsibilities include reviewing SOC alerts, conducting investigations, and maintaining rigorous documentation. Joining Mercor...SplunkRemote work
- ...Investigation Specialist in Portland, Oregon. This role involves reviewing and conducting security investigations, with a focus on using Splunk for alert triage and decision-making. Candidates should have 3+ years of experience in a production SOC environment and strong...SplunkRemote work
- ...Investigation Specialist in Lenexa, Kansas. The candidate should have over 3 years of experience in SOC environments, strong skills in Splunk, and the ability to perform thorough security investigations. Responsibilities include handling SOC alerts, validating...SplunkRemote work
- ...to enhance SOC automation and AI-driven investigations. The ideal candidate has over 3 years of SOC experience, strong expertise in Splunk, and the ability to analyze complex alerts and investigations. Responsibilities include evaluating SOC alerts, providing detailed...SplunkRemote work
- ...performing thorough investigations, and mentoring analysts. Candidates should have over 3 years of SOC analyst experience, strong Splunk skills, and the ability to make informed decisions under pressure. Enjoy a cutting-edge environment and collaborate with top security...SplunkRemote work
- ...perform detailed investigations, and maintain documentation. The ideal candidate has over 3 years in SOC analysis, excels in using Splunk, and has strong investigative judgment. This role offers the opportunity to collaborate with top-tier security professionals and influence...SplunkRemote work
- ...and AI-driven investigation systems. Ideal candidates will have over 3 years of hands-on SOC analyst experience and strong skills in Splunk. Responsibilities include reviewing SOC alerts, performing investigations, and maintaining clear documentation. Join Mercor to...SplunkRemote work
- ...investigations, and mentoring junior analysts. Ideal candidates will have over 3 years of experience in SOC environments, be proficient in Splunk, and possess strong investigative judgment. Join Mercor and contribute to innovative security solutions in a collaborative...SplunkRemote work
- ...their high-growth technology initiatives. The ideal candidate will have over 3 years as a SOC analyst and strong expertise in using Splunk for security investigations. Responsibilities include reviewing alerts, conducting thorough investigations, and mentoring fellow...SplunkRemote work
- ...technologies such as F5 LTM and Citrix NetScaler. ~ Experienced in using In-depth protocol analysis tools such as Wireshark and Splunk. ~ Ability to analyze device and traffic logs, extensive knowledge of TCP/IP protocol stack and firewall Additional skills in Cisco...SplunkLocal areaRemote work
- ...flow control, and disk-based queue management mechanisms within syslog-ng environments. Collaborate with SIEM platforms such as Splunk, ELK, or QRadar to ensure seamless data ingestion and integration. Implement best practices for structured and unstructured log...SplunkRemote jobFull time
- ...high-growth technology efforts. This position requires 3+ years as a SOC analyst, strong investigative judgment, and proficiency in Splunk to evaluate alerts and conduct thorough investigations. The ideal candidate will collaborate with experts in cutting-edge SOC...SplunkRemote work
- ...to handle AI-driven investigations and SOC automation. Ideal candidates will have 3+ years of SOC experience and strong skills in Splunk, alert triage, and investigative judgment. The role involves monitoring alerts, conducting investigations, and documenting processes...SplunkRemote work
$180k - $200k
...and Observability: Extensive experience with monitoring and observability tools like Datadog, Prometheus, Grafana, ELK stack, or Splunk. Skilled in setting up detailed monitoring and logging systems SLOs and SLA Management: Proven ability to define, monitor, and...SplunkFor contractorsWork at officeWork from homeFlexible hours- ...automation and AI-driven investigation systems. The ideal candidate will have 3+ years of SOC analyst experience, particularly using Splunk for analysis. Responsibilities include monitoring SOC alerts, conducting thorough investigations, and documenting findings. Join...SplunkRemote work
- ...have over 3 years of hands-on SOC analyst experience, specialize in high-quality security investigations, and be skilled in using Splunk for log analysis. The role involves reviewing SOC alerts, performing comprehensive investigations, and collaborating with cybersecurity...SplunkRemote work
- ...performing security investigations, and maintaining documentation. Ideal candidates have 3+ years of SOC experience, proficiency with Splunk, and strong investigative judgment. Join our team to shape future security operations and collaborate with experienced...SplunkRemote work


