Splunk is here to build a safer and more resilient digital world. The world's leading enterprises use our unified security and observability platform to keep their digital systems secure and reliable. While customers love our technology, it's our people that make Splunk stand out as an amazing career destination and why we've won so many awards as a best place to work. If you become a Splunker, we want your whole, authentic self, what we call your "million data points". So bring your work experience, problem-solving skills and talent, of course, but also bring your joy, your passion and all the things that make you, you.
Role Summary
This entry level role will report to the Manager of Security Platform Engineering within the Splunk Global Security (SGS) organization to join a hardworking team of security engineers. As a junior member of the Security Engineering team, you will be responsible for assisting in designing, developing and deploying tools and solutions to improve Splunk’s security posture. You will have an opportunity to learn and use an entire range of skills and interact with a number of teams within Splunk Security ranging from SOC, Incident Response (IR) and Forensic, Threat and Vulnerability Management (TVM) and Cybersecurity Risk.
What you'll get to do
- Design, code, build and maintain standalone tools on Cloud infrastructure for all SGS employees to use.
- Assist in creating solutions to solve security problems in our Corporate and Cloud environments.
- Report and respond to possible threats, security issues or vulnerabilities
- Work with internal and external auditor teams to meet and exceed requirements.
- Assist in operationalizing, Monitor, and Test Security tools across Splunk environments
- Assist in developing Security Automation Solutions
- Learn to create Splunk Dashboards for reporting Security features
- Participates in a 1-3 time a year on call rotation for a week, which includes 24/7 support for security tool operations
Must-have Qualifications
- Minimum Bachelor's Degree with 2+ years' of Application Security Experience, System Administration or Network Engineering
- Understanding of security controls, their purpose, and value they bring in improving Security
- Scripting (e.g., Python, Perl, Ruby, Bash, RegEx) or development (e.g., C++, Python, JavaScript) experience
- Linux Administration skills (e.g. Command-line usage, configuration management, security hardening)
- Good system design skills and optimal solutions to problems balancing scope, performance and other trade-offs.
- Exceptional written communication skills
Nice-to-have Qualifications
We’ve taken special care to separate the must-have qualifications from the nice-to-haves. “Nice-to-have” means just that Nice. To. Have. So, don’t worry if you can’t check off every box. We’re not hiring a list of bullet points–we’re interested in the whole you.
- Understanding of cloud technologies (such as AWS and GCP)
- Hands on experience with product security vulnerability exploitation, mitigation, and remediation
- Working experience with common security tools (e.g., Wireshark, Burp, Nmap, Nessus, tcpdump ) or security scanners (e.g., Semgrep, Trivy)
- Understanding and/or experience with vulnerability management, incident response and forensics, cloud computing, and/or security automation, network engineering, experience with Splunk
- Certifications such as Sec +, CISSP, GSEC, CEH or CISM are a bonus.
- Prior experience with Splunk or other log aggregation systems
- Excellent communication and project management skills
Splunk is an Equal Opportunity Employer
At Splunk, we believe creating a culture of belonging isn’t just the right thing to do; it’s also the smart thing. We prioritize diversity, equity, inclusion, and belonging to ensure our employees are supported to bring their best, most authentic selves to work where they can thrive. Qualified applicants receive consideration for employment without regard to race, religion, color, national origin, ancestry, sex, gender, gender identity, gender expression, sexual orientation, marital status, age, physical or mental disability or medical condition, genetic information, veteran status, or any other consideration made unlawful by federal, state, or local laws. We consider qualified applicants with criminal histories, consistent with legal requirements.
Note
Base Pay Range
SF Bay Area, Seattle Metro, and New York City Metro Area
Base Pay Range $108,400.00 - 149,050.00 per year
California (excludes SF Bay Area), Washington (excludes Seattle Metro), Washington DC Metro, and Massachusetts
Base Pay Range $97,560.00 - 134,145.00 per year
All other cities and states excluding California, Washington, Massachusetts, New York City Metro Area and Washington DC Metro Area.
Base Pay Range $86,720.00 - 119,240.00 per year
Splunk provides flexibility and choice in the working arrangement for most roles, including remote and/or in-office roles. We have a market-based pay structure which varies by location. Please note that the base pay range is a guideline and for candidates who receive an offer, the base pay will vary based on factors such as work location as set out above, as well as the knowledge, skills and experience of the candidate.
In addition to base pay, this role is eligible for incentive compensation and may be eligible for equity or long-term cash awards.
Benefits are an important part of Splunk's Total Rewards package. This role is eligible for a competitive benefits package which includes medical, dental, vision, a 401(k) plan and match, paid time off and much more! Learn more about our comprehensive benefits and wellbeing offering at https //splunkbenefits.com.