Foxhole Technology, Inc.

  • Security/Splunk Engineer

    Job Locations US-DC
    Job ID
    Information Technology
    Regular Full-Time
    Clearance Required
    Secret/TS Capability, Top Secret
  • Overview

    Organization: Department of Education

    Location: Washington, D.C.

    Clearance: Secret


    Foxhole Technology provides gold standard solutions and service to our customers, including but not limited to: Security Incident and Event Management (SIEM); Continuous Monitoring and Risk Scoring (CMRS); Secure Configuration Management (SCM); Systems, Software and Network Engineering; Developmental Test and Evaluation (DT&E); and Authorization and Accreditation (A&A). Our in-depth expertise provides robust capabilities in penetration testing, program management and information security, as well as in all areas of cyber security engineering for DoD, Federal and civilian agencies.

    Job Description

    The Security Engineer, under the direction of the senior engineer, is responsible for providing systems engineering, administration, monitoring, analysis, and operations supporting the implementation of existing and planned capabilities and tools within the Security Operations Center. Candidates are required to have Splunk experience with an understanding of implementation best practices, in-depth knowledge in architectural variations, scalability, capacity planning, distributed setup, search head clustering, indexer clustering, and performance specifications. In addition, the following is expected of the candidate:

    Provide DevOps support for a Federal Agency multi-region instance of Splunk Enterprise. This includes: user account and access management; server management, monitoring, and patching; data management; software upgrades; and installation and maintenance of Splunk applications.

    Improve log coverage and quality by:

    • Reconciling records of log sources in Splunk with other asset management data to identify assets whose logs are not in Splunk
    • Establishing specific logging standards for commonly used software applications and monitoring compliance with those standards
    • Automating the production of documentation of the log sources in each Splunk index
    • Implementing machine learning in Splunk to improve existing anomaly detection and analysis capabilities
    • Developing and deploying custom dashboards and visualizations

    Understand VPN, VLAN, cloud and mobile network technologies.

    Management of Linux and Window Servers.

    Capable of scripting using bash, python or windows power shell.

    Excellent written and oral communication skills.

    Minimum Requirements

    • Bachelor of Science 
    • 3+ years experience Network monitoring 
    • 3+ years experience creating custom IDS/IPS signatures based on new threats and adversary Tactics, Techniques, and Procedures.
    • Familiar with network-attack behavior – malware C2, exploit kits, Trojans, phishing techniques.
    • Understanding of VPN, VLAN, cloud, and mobile network technologies.
    • Experience working within in a Security Operations Center or similar environment.
    • 2+ years of experience Splunk administration/engineering.
    • Experience in Unix, Solaris, Linux, or Windows servers.
    • Experience scripting using bash, python, or Windows PowerShell.

    More Information

    The Department of Education, Cyber Security Operations Branch, is tasked with the mission to plan, coordinate, integrate, and conduct the activities necessary to ensure the protection and availability of the Department’s information infrastructure and assets. 

    Foxhole Technology provides support in three major areas:

    1. We operate and and maintain the ED Security Operations Center (EDSOC) that monitors, detects, analyzes, mitigates, and responds to cyber threats and adversarial activity against Department assets, networks, and information. The EDSOC supports the Department's Cyber Incident Responses Capability (EDCIRC) in rapidly responding and resolving incidents with minimal impact to the Department.
    2. We support Advanced Analysis, Response, and Research Services to include digital forensics, malware analysis, Insider Threat analysis, and cyber threat analysis. This capability area focuses on the activities necessary to investigate causes and sources of incidents and exploits based on evidence collection and the collection, analysis and production of cyber security intelligence information.
    3. We support the Vulnerability Management Program, which includes Independent Verification and Validation (IV&V), and Plan of Action and Milestones (POA&M) activities. The associated activities are the identification, tracking, reporting, and remediating vulnerabilities in the Department’s information systems as well as to verify and validate compliance to configuration standards.

    Foxhole Technology Commitments

    Accessibility and Accommodations
    For Individuals with Disabilities, Medical Conditions, or Physical or Mental Impairments: Foxhole Technology is committed to ensuring our employment process is open to all individuals. We provide reasonable accommodations to individuals who need assistance during any part of the employment process due to a disability, medical condition, or physical or mental impairment. Reasonable accommodations are considered on a case-by-case basis. If you are selected for further consideration and need an accommodation for any part of the application or interview process, please notify your Recruiting Representative. 


    Equal Opportunity Employer
    FoxholeTechnology is an Equal Opportunity Employer. We welcome and encourage diversity in our workforce. It is the policy of Foxhole Technology to provide equal employment opportunity to all employees and qualified applicants without regard to race, color, religion, national origin, sex, age, disability, pregnancy, sexual orientation, gender identity, transgender status, genetic information, protected veteran status, or any other protected characteristic under federal, state or local laws.


    Click Here to view the Pay Transparency Policy Statement.

    Click Here to see your rights under the Family Medical Leave Act. 
    Click Here for a summary of EEO rights on the "EEO is the Law" poster.
    Foxhole Technology participates in E-Verify. Download the PDF for more detail

    Former Employees
    We invite and encourage former employees to explore new opportunities with us. Rejoining the company can enhance newly acquired skills and build on the strong fundamental skills developed at Foxhole Technology. Employees that return to the company may be eligible for reinstatement of some benefits based on total years of service.


    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed