Cyber Defense Analyst – Intermediate

Security AnalystSecurity AnalystFull TimeRemote

Location

United States

Posted

7 days ago

Salary

Not specified

SplunkSIEMLinuxWindowsTcp/ipDNSHTTPReg ExLog Analysis

Job Description

This description is a summary of our understanding of the job description. Click on 'Apply' button to find out more.

Role Description

Tangent Technologies is seeking a Cyber Defense Analyst – Intermediate with Splunk experience to support the sustainment and administration of enterprise Splunk SIEM environments. This position focuses on maintaining Splunk infrastructure, onboarding log sources, supporting dashboards and searches, and assisting cybersecurity teams with log analysis.

This position supports a US Government Agency and the candidate must be a US Citizen. This role is 100% remote, making it an excellent opportunity for a mid-level Splunk engineer or SOC analyst with Splunk experience who wants to grow their SIEM engineering skills while supporting federal cybersecurity programs.

  • Support administration and maintenance of Splunk Enterprise environments
  • Configure and maintain log ingestion and Splunk forwarders
  • Onboard new data sources, applications, and infrastructure logs
  • Develop and maintain Splunk dashboards, searches, and reports
  • Assist with field extractions, log parsing, and normalization
  • Support cybersecurity teams by running log queries and event analysis
  • Assist with alert tuning and detection use case development
  • Troubleshoot Splunk search performance and indexing issues
  • Maintain documentation related to log sources, dashboards, and monitoring capabilities

Qualifications

  • 3–6 years of experience in cybersecurity operations, SIEM administration, or system engineering
  • Hands-on experience with Splunk Enterprise or similar SIEM platforms
  • Experience onboarding log sources and configuring Splunk forwarders
  • Experience creating search queries, dashboards, and reports
  • Familiarity with Linux or Windows system logs
  • Understanding of network protocols (TCP/IP, DNS, HTTP)
  • Strong troubleshooting and documentation skills

Requirements

  • Splunk Power User or Splunk Admin certification
  • Experience supporting Splunk Enterprise Security
  • Experience in a Security Operations Center (SOC)
  • Familiarity with log parsing, regex, or scripting
  • Experience integrating cloud, endpoint, or network security logs

Federal Suitability and Background Investigation

This position supports a federal financial regulatory agency. Candidates selected for this role will be required to successfully complete a government background investigation prior to beginning employment. The investigation may include verification of employment history, criminal history, education, and a review of financial responsibility and credit history consistent with federal suitability requirements for individuals supporting financial regulatory agencies. Employment is contingent upon the candidate’s ability to obtain and maintain the required suitability determination.

Job Requirements

  • 3–6 years of experience in cybersecurity operations, SIEM administration, or system engineering
  • Hands-on experience with Splunk Enterprise or similar SIEM platforms
  • Experience onboarding log sources and configuring Splunk forwarders
  • Experience creating search queries, dashboards, and reports
  • Familiarity with Linux or Windows system logs
  • Understanding of network protocols (TCP/IP, DNS, HTTP)
  • Strong troubleshooting and documentation skills
  • Splunk Power User or Splunk Admin certification
  • Experience supporting Splunk Enterprise Security
  • Experience in a Security Operations Center (SOC)
  • Familiarity with log parsing, regex, or scripting
  • Experience integrating cloud, endpoint, or network security logs
  • Federal Suitability and Background Investigation
  • This position supports a federal financial regulatory agency. Candidates selected for this role will be required to successfully complete a government background investigation prior to beginning employment. The investigation may include verification of employment history, criminal history, education, and a review of financial responsibility and credit history consistent with federal suitability requirements for individuals supporting financial regulatory agencies. Employment is contingent upon the candidate’s ability to obtain and maintain the required suitability determination.

Related Job Pages

More Security Analyst Jobs

Full TimeRemote

The Information / Cybersecurity Specialist 1 supports cybersecurity and information assurance activities related to the protection of information systems, applications, and data supporting mission platforms. This role assists in implementing security controls, monitoring system s...

AWSAzureGCPDockerKubernetesLinuxWindowsPythonBashCI/CD
United States

Security Analyst Team Lead

Jobgether

We use an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements. Our system identifies the top-fitting candidates, and this shortlist is then shared directly with the hiring company. The final decision and next steps (interviews, assessments) are managed by their internal team. We appreciate your interest and wish you the best! Data Privacy Notice: By submitting your application, you acknowledge that Jobgether will process your personal data to evaluate your candidacy and share relevant information with the hiring employer. This processing is based on legitimate interest and pre-contractual measures under applicable data protection laws (including GDPR). You may exercise your rights (access, rectification, erasure, objection) at any time. #LI-CL1 We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.

Security Analyst8 days ago
Full TimeRemote

This role offers the opportunity to lead a high-performing team of security analysts within a fast-paced, customer-focused cybersecurity environment. You will oversee incident response operations for commercial clients, ensuring timely resolution of complex security incidents whi...

Incident ResponseCybersecurityInvestigationsTeam LeadershipCustomer OperationsProcess DevelopmentKPI Management
United States

Investigator III

Premera Blue Cross

Improve customers' lives by making healthcare work better.

Security Analyst8 days ago
Full TimeRemoteTeam 1,001-5,000Since 1945H1B Sponsor

The Investigator III leads complex investigations into external fraud, waste, and abuse (FWA), managing cases from initiation to resolution and producing thorough investigative reports. This role involves analyzing claim data, conducting field work including interviews and surveillance, and working to recover improper payments while ensuring regulatory compliance.

ExcelAccessICD-10CPTHCPCSdata miningfraud detection softwareclaims processing platformsbackground check systemstechnical writing
United States
$80.2K - $118K / year
Full TimeRemote

The Philadelphia Gun Violence Task Force investigates and prosecutes firearms trafficking, the straw purchase of firearms, the movement of illegal guns, and violent gun crime. This position involves working with the criminal investigative bureaus of the Office of Attorney General...

Intelligence AnalysisCriminal JusticeeTraceData AnalysisCriminal InvestigationReport WritingData ManagementThreat AssessmentDatabase QueryingLaw Enforcement
United States