Splunk, a Cisco company, is building a safer and more resilient digital world with an end-to-end full stack platform made for a hybrid, multi-cloud world. Leading enterprises use our unified security and observability platform to keep their digital systems secure and reliable. Our customers love our technology, but it's our caring employees that make Splunk stand out as an amazing career destination. No matter where in the world or what level of the organization, we approach our work with kindness. So bring your work experience, problem-solving skills and talent, of course, but also bring your joy, your passion and all the things that make you, you. Come help organizations be their best, while you reach new heights with a team that has your back.
Role:
The Cybersecurity Incident Response Analyst works in Splunk's global, shift-based, 24/7 Security Operations Center (SOC) supporting the detection and response to cyber threats. You will have comprehensive applied knowledge of Information Security and Information Technology principles, excellent communication skills, and a desire to continuously learn and grow. We are a passionate team who has fun and enjoys a good laugh, but above all else, thinks security first!
Responsibilities:
- Support the 24x7 SOC operation: respond to security alerts, contain threats, and ensure the safety and security of Splunk's product environments
- Contribute to the development and improvement of detection logic, working hand-in-hand with our Detection Engineering function
- Improve the quality of searches to enrich data through creation of automation and orchestration playbooks
- Perform reactive and novel threat hunting engagements across Splunk environments to surface sophisticated attacks and threats
- Collect and represent evidence to support the organization's compliance and control monitoring responsibilities
- Author, review, and update existing runbooks to ensure optimal and efficient response actions
- Partner with Splunk's Center of Excellence to validate existing data sources and improve data ingestion standards, ensuring data quality
- Collaborate with product development teams to support testing, feedback, and idea generation for Splunk products
- Serve as a trusted resource to your fellow analysts, providing guidance, mentorship, and support in day-to-day operations and projects to elevate overall team performance
Requirements:
- 5+ years of related experience; or Masters degree with 3 years of related experience
- Bachelor's degree in computer science or related field or equivalent relevant experience
- Robust experience with information security technologies, including firewalls, intrusion detection systems, and endpoint security tools; solid understanding of cloud and container security tools and practices is a plus
- Solid grasp of TCP/IP protocols, DNS, network analysis, and the OSI framework
- Experience with cloud platforms and technologies
- Ability to multitask, prioritize, and lead response operations and team initiatives
- Ability to think outside of the box for creative solutions to problems with the moxie to follow-through
- Excellent interpersonal skills and ability to see situations through a Customer First lens; ability to translate sophisticated technical concepts into clear, accessible language
- Meticulous attention to detail; consistently meets high standards of quality
Splunk is an Equal Opportunity Employer
At Splunk, we believe creating a culture of belonging isn’t just the right thing to do; it’s also the smart thing. We prioritize diversity, equity, inclusion, and belonging to ensure our employees are supported to bring their best, most authentic selves to work where they can thrive. Qualified applicants receive consideration for employment without regard to race, religion, color, national origin, ancestry, sex, gender, gender identity, gender expression, sexual orientation, marital status, age, physical or mental disability or medical condition, genetic information, veteran status, or any other consideration made unlawful by federal, state, or local laws. We consider qualified applicants with criminal histories, consistent with legal requirements.
Note:
Base Pay Range
SF Bay Area, Seattle Metro, and New York City Metro Area
Base Pay Range: $133,600.00 - 183,700.00 per year
California (excludes SF Bay Area), Washington (excludes Seattle Metro), Washington DC Metro, and Massachusetts
Base Pay Range: $120,240.00 - 165,330.00 per year
All other cities and states excluding California, Washington, Massachusetts, New York City Metro Area and Washington DC Metro Area.
Base Pay Range: $106,880.00 - 146,960.00 per year
Splunk provides flexibility and choice in the working arrangement for most roles, including remote and/or in-office roles. We have a market-based pay structure which varies by location. Please note that the base pay range is a guideline and for candidates who receive an offer, the base pay will vary based on factors such as work location as set out above, as well as the knowledge, skills and experience of the candidate. In addition to base pay, this role is eligible for incentive compensation and may be eligible for equity or long-term cash awards.
Benefits are an important part of Splunk's Total Rewards package. This role is eligible for a competitive benefits package which includes medical, dental, vision, a 401(k) plan and match, paid time off and much more! Learn more about our next-level benefits at https://splunkbenefits.com.