×
Register Here to Apply for Jobs or Post Jobs. X

NSIPS Cyber Engineer – Splunk Analyst | Secret Clearance

Job in New Orleans, Jefferson Parish, Louisiana, 70123, USA
Listing for: General Dynamics Information Technology
Full Time position
Listed on 2026-02-16
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below
Location: New Orleans

Req : RQ213445

Type of Requisition: Regular

Clearance Level Must Be Able to Obtain: Secret

Public Trust/Other

Required:

None

Job Family: Cyber and IT Risk Management

Skills:

McAfee Host Intrusion Prevention,McAfee Network Security,Splunk Administration,Splunk Enterprise Security,Splunk Infrastructure Monitoring

Certifications:

AWS Certified AI Practitioner | Amazon Web Services (AWS) – Amazon Web Services (AWS), Splunk Core Certified Advanced Power User | Splunk – Splunk, Splunk Core Certified Power User | Splunk – Splunk

Experience:

3 + years of related experience

US Citizenship

Required:

Yes

Job Description

CYBER ENGINEER (Splunk Analyst)- A SECRET CLEARANCE IS A MUST HAVE TO START

The Navy Standard Integrated Personnel System (NSIPS) is seeking a Cyber Engineer/Splunk Analyst to join their team.
NSIPS is the Navy’s single, field-entry, electronic pay and personnel system for all USN/USNR Sailors.

As the Cyber Analyst you will:
  • Designs develop, test, and evaluate information system security throughout the systems development life cycle
  • Monitors and analyzes Intrusion Detection Systems (IDS) to identify security issues for remediation
  • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information
  • Evaluate firewall change requests and assess organizational risk
  • Communicates alerts to teams regarding intrusions and compromises to their network infrastructure, applications, and operating systems
  • Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices
  • Implements, enforces, communicates, and develops security policies or plans for data, software applications, hardware, telecommunications, and information systems security education/awareness programs
  • Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system, and external Web integrity scans to determine compliance
  • Prepares incident reports of analysis methodology and results
  • Implement approved Splunk SaaS architecture and design
  • Support and maintain high availability for SaaS Splunk deployments
  • Maintain Splunk architectural diagrams and documentation
  • Ensure compliance with regulations and privacy laws
  • Perform DoD system certification and accreditation activities as prescribed by IA leadership
  • Develop and document IA processes and procedures for the environment as necessary
  • Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research
  • DISA Security Technical Implementation Guidelines (STIG) for an operational DoD environment, including scheduling, validation, remediation, and reporting
  • Work with customers, software developers, network/system administrators, and others to ensure that security requirements are understood and implemented
Basic Qualifications
  • BS degree; 3 additional years of experience may be considered in lieu of a degree
  • 1-2+ years of experience with log sources, including various network, host, and application logs
  • 1-3+ years of experience in utilizing SIEM for log analysis, monitoring, and investigation
  • 1-2+ years of experience identifying attacker tactics, techniques, and procedures
  • 1-2+ years of experience using threat intelligence to find suspicious activities proactively and iteratively in available security telemetry
  • 1-2+ years of experience working in a Security Operations Center (SOC) environment
  • 1-3+ years of hands-on experience writing and optimizing detection queries using various query languages, particularly in SPL for Splunk
  • Demonstrated understanding of modern attack patterns and threat landscape
  • Demonstrated excellent analytical and problem-solving skills with the ability to identify and mitigate security risks
  • 1-2+ years of experience in intrusion detection, security investigations, and incident response
  • 1-3+ years of experience and working knowledge of Splunk Enterprise Security platform
  • 1-2+ years of experience in Detection Engineering or Digital Forensics with broad…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary