Cyber Defense Analyst – Intermediate
Location
United States
Posted
7 days ago
Salary
Not specified
Job Description
Role Description
Tangent Technologies is seeking a Cyber Defense Analyst – Intermediate with Splunk experience to support the sustainment and administration of enterprise Splunk SIEM environments. This position focuses on maintaining Splunk infrastructure, onboarding log sources, supporting dashboards and searches, and assisting cybersecurity teams with log analysis.
This position supports a US Government Agency and the candidate must be a US Citizen. This role is 100% remote, making it an excellent opportunity for a mid-level Splunk engineer or SOC analyst with Splunk experience who wants to grow their SIEM engineering skills while supporting federal cybersecurity programs.
- Support administration and maintenance of Splunk Enterprise environments
- Configure and maintain log ingestion and Splunk forwarders
- Onboard new data sources, applications, and infrastructure logs
- Develop and maintain Splunk dashboards, searches, and reports
- Assist with field extractions, log parsing, and normalization
- Support cybersecurity teams by running log queries and event analysis
- Assist with alert tuning and detection use case development
- Troubleshoot Splunk search performance and indexing issues
- Maintain documentation related to log sources, dashboards, and monitoring capabilities
Qualifications
- 3–6 years of experience in cybersecurity operations, SIEM administration, or system engineering
- Hands-on experience with Splunk Enterprise or similar SIEM platforms
- Experience onboarding log sources and configuring Splunk forwarders
- Experience creating search queries, dashboards, and reports
- Familiarity with Linux or Windows system logs
- Understanding of network protocols (TCP/IP, DNS, HTTP)
- Strong troubleshooting and documentation skills
Requirements
- Splunk Power User or Splunk Admin certification
- Experience supporting Splunk Enterprise Security
- Experience in a Security Operations Center (SOC)
- Familiarity with log parsing, regex, or scripting
- Experience integrating cloud, endpoint, or network security logs
Federal Suitability and Background Investigation
This position supports a federal financial regulatory agency. Candidates selected for this role will be required to successfully complete a government background investigation prior to beginning employment. The investigation may include verification of employment history, criminal history, education, and a review of financial responsibility and credit history consistent with federal suitability requirements for individuals supporting financial regulatory agencies. Employment is contingent upon the candidate’s ability to obtain and maintain the required suitability determination.
Job Requirements
- 3–6 years of experience in cybersecurity operations, SIEM administration, or system engineering
- Hands-on experience with Splunk Enterprise or similar SIEM platforms
- Experience onboarding log sources and configuring Splunk forwarders
- Experience creating search queries, dashboards, and reports
- Familiarity with Linux or Windows system logs
- Understanding of network protocols (TCP/IP, DNS, HTTP)
- Strong troubleshooting and documentation skills
- Splunk Power User or Splunk Admin certification
- Experience supporting Splunk Enterprise Security
- Experience in a Security Operations Center (SOC)
- Familiarity with log parsing, regex, or scripting
- Experience integrating cloud, endpoint, or network security logs
- Federal Suitability and Background Investigation
- This position supports a federal financial regulatory agency. Candidates selected for this role will be required to successfully complete a government background investigation prior to beginning employment. The investigation may include verification of employment history, criminal history, education, and a review of financial responsibility and credit history consistent with federal suitability requirements for individuals supporting financial regulatory agencies. Employment is contingent upon the candidate’s ability to obtain and maintain the required suitability determination.
Related Guides
Related Categories
Related Job Pages
More Security Analyst Jobs
The Information / Cybersecurity Specialist 1 supports cybersecurity and information assurance activities related to the protection of information systems, applications, and data supporting mission platforms. This role assists in implementing security controls, monitoring system s...
Security Analyst Team Lead
JobgetherWe use an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements. Our system identifies the top-fitting candidates, and this shortlist is then shared directly with the hiring company. The final decision and next steps (interviews, assessments) are managed by their internal team. We appreciate your interest and wish you the best! Data Privacy Notice: By submitting your application, you acknowledge that Jobgether will process your personal data to evaluate your candidacy and share relevant information with the hiring employer. This processing is based on legitimate interest and pre-contractual measures under applicable data protection laws (including GDPR). You may exercise your rights (access, rectification, erasure, objection) at any time. #LI-CL1 We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
This role offers the opportunity to lead a high-performing team of security analysts within a fast-paced, customer-focused cybersecurity environment. You will oversee incident response operations for commercial clients, ensuring timely resolution of complex security incidents whi...
The Investigator III leads complex investigations into external fraud, waste, and abuse (FWA), managing cases from initiation to resolution and producing thorough investigative reports. This role involves analyzing claim data, conducting field work including interviews and surveillance, and working to recover improper payments while ensuring regulatory compliance.
The Philadelphia Gun Violence Task Force investigates and prosecutes firearms trafficking, the straw purchase of firearms, the movement of illegal guns, and violent gun crime. This position involves working with the criminal investigative bureaus of the Office of Attorney General...