Splunk

DevOps Engineer – Top Secret Clearance (Onsite, Huntsville AL)

DevOps Engineer (Top Secret Required)

💰 Salary: Up to $170,000
📍 Location: Huntsville, Alabama (100% Onsite)
🏢 Work Model: Fully Onsite
💼 Employment Type: Full-Time
🔐 Clearance: Active Top Secret (CI Poly required)
🎓 Education: Bachelor’s Degree Required
🚚 Relocation Assistance: Available (up to $10,000)

About the Role

We are seeking a DevOps Engineer to join a high-performing cyber team supporting a large SOC enterprise environment. This role is hands-on and mission-critical, focused on designing, deploying, operating, and securing DevSecOps infrastructure in a classified environment.

You’ll work across infrastructure, automation, and cybersecurity tooling—supporting everything from deployment and patching to troubleshooting complex interoperability issues.

Key Responsibilities

  • Design, deploy, test, certify, and operate DevSecOps infrastructure tools

  • Own operations and maintenance for multiple platform tools

  • Deploy and configure services using Infrastructure as a Service (IaaS)

  • Configure and manage Linux-based servers supporting dynamic applications

  • Debug cluster-based computing architectures

  • Use scripting or basic programming to solve operational issues

  • Install, configure, and manage open-source monitoring tools

  • Perform patching, upgrades, and sustainment activities

  • Address system interoperability and operational stability issues

Required Qualifications

  • Active Top Secret Security Clearance with willingness to sit for CI Poly

  • Bachelor’s degree (BS or BA)

  • 5+ years of DevOps-related experience

  • Strong experience administering Linux-based environments

  • Experience testing, deploying, maintaining, and administering cybersecurity infrastructure

  • Experience developing or modifying applications or utility programs for cybersecurity use

  • Comfortable operating in secure, enterprise SOC environments

Preferred Skills & Certifications

  • Red Hat Certified Systems Administrator (RHCSA)

  • AWS Certified Cloud Practitioner

  • AWS Certified DevOps Engineer – Associate

  • Experience with:

    • Splunk

    • Oracle / SQL-based platforms

    • Python scripting

  • Experience integrating third-party components and custom capabilities

  • Proven ability to automate operations and maintenance tasks

  • Strong troubleshooting and process-improvement mindset

Ideal Candidate Profile

  • Holds an active Top Secret clearance

  • Willing to complete a CI Polygraph

  • Has hands-on DevOps experience in secure cyber environments

  • Exposure to Splunk preferred

  • Willing to relocate to Huntsville, AL

  • Self-driven, technically curious, and operationally strong

Benefits

  • 3 weeks Paid Time Off

  • 2 weeks Holiday Pay

  • Medical, Dental, and Vision Insurance

  • Short--Term & Long-Term Disability

  • Life Insurance & AD&D

  • 401(k) with up to 4% match

  • Relocation assistance available (up to $10,000)

Additional Details

  • Security Clearance Required: Yes

  • Visa Sponsorship: Not available

  • Travel: None

 

Information Security Analyst | Cybersecurity, Threat Intelligence & Incident Response | Madison, WI | $97K–$146K

Information Security Analyst

📍 Madison, Wisconsin (Hybrid – Flexible Work From Home Days)
📅 Full-time | Mid-Senior Level

💰 Salary: $97,000 – $146,000 per year
Benefits: Full package (healthcare, retirement, PTO & more)

🚀 About the Role

We are seeking a skilled Information Security Analyst to strengthen our cybersecurity defenses and protect enterprise systems from evolving threats. In this hands-on, high-impact role, you’ll be at the forefront of detecting, analyzing, and responding to incidents—keeping critical data and infrastructure safe.

This position offers a unique opportunity to work across threat intelligence, incident response, and digital forensics, while collaborating with cross-functional teams to enhance the organization’s overall security posture.

🛡️ Key Responsibilities

  • Monitor and analyze threat intelligence to assess risks and drive proactive defense strategies.

  • Investigate escalated incidents (malware, phishing, unauthorized access) through the full response lifecycle.

  • Conduct forensic investigations, advanced data collections, and eDiscovery requests.

  • Support incident response tabletop exercises to identify gaps and enhance readiness.

  • Review vulnerability scans and penetration test results, recommending improvements.

  • Develop and maintain security policies, standards, and training to strengthen organizational awareness.

  • Collaborate with IT, Legal, HR, and leadership teams on investigations and compliance.

🔧 Required Skills & Experience

  • 5+ years of information security experience (audit, assessment, engineering, or architecture).

  • Strong understanding of incident response, threat intelligence, and forensic analysis.

  • Experience with tools such as Magnet Forensics Axiom Cyber, Splunk, Microsoft Defender, and MITRE ATT&CK.

  • Ability to clearly communicate technical findings to both technical and non-technical audiences.

  • Proven expertise in developing security policies, standards, and governance practices.

  • Bachelor’s degree in Computer Science, Information Systems, or related field (or equivalent experience).

🎯 Preferred Qualifications

  • Financial Services industry background.

  • Law enforcement or forensics experience.

  • Strong consulting, negotiation, and relationship management skills.

This role is ideal for a proactive cybersecurity professional who thrives on investigating threats, improving defenses, and collaborating to protect sensitive information.