Credence is one of the largest privately held technologies services company in the country, repeatedly recognized as a top place to work, and have been on the Inc. 5000 Fastest Growing Private Companies list for the last 12 years. We practice servant leadership and believe that by focusing on the success of our clients, team members, and partners, we all achieve greater success.
At Credence, we support our clients’ mission-critical needs, powered by technology. We provide cutting-edge solutions, including AI/ML, enterprise modernization, and advanced intelligence capabilities, to the largest defense and health federal organizations. Through partnership and trust, we increase mission success for warfighters and secure our nation for a better future.
Position Summary
Credence has an immediate need for a Splunk Engineer with demonstrated experience designing, implementing, deploying, and managing complex Splunk environments for highly complex federal organizations. The ideal candidate must be experienced in customizing Splunk to meet specific use cases and requirements, develop and maintain Splunk dashboards, and create reports tailored to the needs of different teams and stakeholders. The successful candidate will be responsibilities for providing oversight, monitoring indexing performance, search performance, and data ingest. Must have demonstrated experience supporting remediation of discovered threats and provide incident response capabilities when necessary as well as remain up-to-date with the latest Splunk features, enhancements, and industry trends, managing relationships with Splunk vendors to stay informed about new products and offerings. The successfull candidate will analyze and conduct research to determine a cyber criminal’s capabilities, intentions, and attack approaches, including those with multiple phases.Will support and manage remediation of any discovered threats, and providing incident response capabilities when necessary.
Responsibilities include, but are not limited to the duties listed below
- Create, manage, and support automation solutions for Splunk orchestration
- Use the SIEM, EDR, IDS, and other tools to conduct cyber threat hunts
- Rapidly respond to incidents to minimize risk exposure and ensure system availability; proactively monitor internal and external-facing environments
- Identify attacker tools, tactics, and procedures to develop indicators of compromise. Form and articulate expert opinions based on findings and analysis
- Seek opportunities to automate detection and remediation and reduce response times for incidents
- Provide incident response support and coordination, including investigating security incidents and coordinating with other teams to contain and remediate the incident.
- Leverage Splunk to create advanced search queries and reports to monitor system performance, security threats, and operational metrics.
- Collaborate and support inquiries from cross-functional internal and external stakeholders such as system administrators, compliance, and data engineering teams, to ensure documentation is complete and in compliance with information security policies
- Manage and support the development of security operations playbooks to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats
- Evaluate third-party products and services to verify they meet security and compliance requirements
- Familiarity with log management, event correlation, and data analysis concepts.
- Drive improvements in technical architecture, standards, and processes to meet company objectives and best security practices
- Develops technical solutions to verify compliance with required technical controls autonomously
- Present findings/reports to stakeholders on a weekly basis
- Perform log analysis, parsing, indexing, and analyzing machine data logs to extract actionable insights.
- Perform upgrades and patch management to keep Splunk environments up-to-date and secure.
- Design intuitive and customizable dashboards to visualize data trends.
Requirements
- Active Secret security clearance required.
- Masters Degree from an accredited university or equivalent combination of education in Computer Science, Information Technology, or a related field with 5 to 7 years of experience
- Equivalent combination of education, technical training and certification (CISSP, C|EH, GIAC GREM, GCTI, GCFR, GCFA, Splunk Certified Cybersecurity Defense Analyst, Splunk Enterprise Security Certified Admin) and/or work experience; knowledgeable about configuring Splunk for security and compliance requirements, including FISMA, SOC 2, HIPAA, and GDPR.
- Experience in building Splunk Technology Add-ons and configuring field extractions for various data sources
- Strong experience working with Splunk, including architecting and implementing Splunk solutions in large-scale environments.
- Proficiency in SPL (Search Processing Language) for creating complex queries, reports, and dashboards in Splunk.
- Experience in designing, developing, testing, troubleshooting, deploying, and maintaining Splunk solutions, reporting, alerting, and dashboards
- Extensive knowledge of a tier Splunk installation: indexers, forwarders, search heads, clusters
- Experience analyzing system, network, and application logs for attack techniques at all stages of the cyber kill chain
- Experience with more than one or more enterprise-scale EDR and SIEM tool
- Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways.
- Strong analytical and critical thinking skills to identify and address complex data and system issues.
- Strong problem-solving skills to investigate and resolve Splunk platform and data ingestion issues.
- Strong communicator and collaborator, able to work closely with cross-functional teams.
- Knowledgeable in using scripting languages (e.g., Python) and Splunk's built-in scripting to automate routine tasks.
- Detail-oriented with a strong commitment to documenting configurations, processes, and best practices.
- Familiarity with ServiceNow cloud offering and log ingestion to Splunk.
Top Skills
What We Do
Credence provides innovative technology, health, international development, engineering, and management solutions to support mission-critical programs for Federal government customers. We are one of the nation’s largest privately held government contractors.
Our ability to perform exceptionally to implement new solutions, efficiencies, and savings across 220 U.S. Government programs is due to our obsession with exceeding customer expectations and our emphasis on employee wellbeing—best exemplified by our corporate philosophy: “One Measure of Success. Yours.”
WHY WORK WITH CREDENCE? We are consistently rated as a Top Workplace and are proud to be one of the fastest growing privately held firms in the U.S. over the last decade.
Credence treats each customer, teaming partner, and employee as a trusted partner whom we serve. We ensure successful outcomes by focusing on the measure of success that we consider to be most important—Yours.
WHY WORK FOR CREDENCE? We are a diverse, enthusiastic team of professionals who are dedicated to providing exceptional service to our customers. Our culture is focused on employee empowerment, recognition, and reward, and each person is encouraged to take initiative and strive to reach their greatest potential.
HOW CREDENCE GIVES BACK: We believe in giving back to the communities in which we live and work through corporate charitable events, support for employee volunteering, and a 100% corporate match for employee charitable giving.









