Skip to main content
Security and Risk Management

Digital Forensics/Incident Response Engineer (Remote Opportunity)

Join us as we pursue our disruptive new vision to make machine data accessible, usable and valuable to everyone. We are a company filled with people who are passionate about our product and seek to deliver the best experience for our customers. At Splunk, we’re committed to our work, customers, having fun and most meaningfully to each other’s success. Learn more about Splunk careers and how you can become a part of our journey!


The Digital Forensics Incident Response (DFIR) Engineer works within the Splunk Critical Incident Response Team in our fast-growing Splunk Global Security organization. You will have a highly visible role with the responsibility for briefing leadership on the outcomes of your investigations. This role focuses on:

  • Developing tooling and capabilities to scale forensic investigations across cloud, enterprise, and endpoint environments
  • Leading technical investigations relating to various host and infrastructure intrusions
  • Researching and remaining current on various attacker methodologies
  • Performing forensics remotely and in cloud environments.

This role is not a traditional black box digital forensics role. This role requires broad technical capabilities across multiple disciplines supporting incident response ranging from the ability to build and automate tooling, performing packet analysis, analyzing custom logs, understanding OS internals, and integrating technical incident response into a multi-cloud environment. .

Critical thinking and strong analytical report writing are vital for this role, as you will be need to convey highly technical evidence and fact-based conclusions to leadership.


  • You will independently lead technical investigation and perform digital forensics involving a broad range of adversarial activity in cloud environments.
  • Produce workflows for automated data collection and processing of forensic artifacts and images.
  • Help identify and develop ways to improve the team's production and efficiency by accelerating on our existing tools and processes
  • Develop tools and infrastructure to scale digital forensics/incident response across cloud environments.
  • Actively participate in Red/Blue activities
  • Perform root cause analysis and attack reconstruction
  • Lead forensic investigations for all of Splunk.
  • Foster team growth and mentorship. We believe in growing operators through ownership and leadership opportunities. We also believe mentors help both sides of the equation.
  • Provide processes and procedures for triage level forensic collection and analysis to the IR team.


  • 5+ years professional IT or IT Security experience; or 3 years and a Master’s degree
  • 3 years experience leading technical investigations
  • Deep understanding of attacker methodologies
  • Hands on experience with forensics and investigating intrusions in AWS, GCP, and Azure and other cloud environments.
  • Experience using various tools supporting DFIR including GRR, Rekall, SIFT, Volatility, X-Ways, Encase, Wireshark, TCPDump, OSQuery, SIEM, Splunk, CrowdStrike, and other open source and commercially available tools
  • 3+years tooling experience across multiple scripting languages including GoLang, Python, PowerShell, SQL, SPL, etc.
  • Expert knowledge system internals knowledge of Windows, MacOS, and Linux.
  • Efficient report writing skills for varied audiences including both management and technical

We value diversity at our company. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or any other applicable legally protected characteristics in the location in which the candidate is applying.

For job positions in San Francisco, CA, and other locations where required, we will consider for employment qualified applicants with arrest and conviction records.

Splunk's Hiring Practices
Splunk turns machine data into answers. Organizations use market-leading Splunk solutions with machine learning to solve their toughest IT, Internet of Things and security challenges.
Individuals seeking employment at Splunk are considered without regards to race, religion, color, national origin, ancestry, sex, gender, gender identity, gender expression, sexual orientation, marital status, age, physical or mental disability or medical condition (except where physical fitness is a valid occupational qualification), genetic information, veteran status, or any other consideration made unlawful by federal, state or local laws. Click here to review the US Department of Labor’s EEO is The Law notice. Please click here to review Splunk’s Affirmative Action Policy Statement.
Splunk also has policies in place to protect the personal information candidates disclose to us as part of the application process. Please click here to review Splunk’s Career Site Privacy Policy.

Splunk does not discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. Please click here to review Splunk’s Pay Transparency Nondiscrimination Provision.

Splunk is also committed to providing access to all individuals who are seeking information from our website. Any individual using assistive technology (such as a screen reader, Braille reader, etc.) who experiences difficulty accessing information on any part of Splunk’s website should send comments to Please include the nature of the accessibility problem and your e-mail or contact address. If the accessibility problem involves a particular page, the message should include the URL of that page.

Splunk doesn't accept unsolicited agency resumes and won't pay fees to any third-party agency or firm that doesn't have a signed agreement with Splunk.

To check on your application click here.


Find out what makes Splunk such a great place to work

box1 box1
Our Values

We are Splunk. How? Well we're passionate about customer success, driven by data, real and respectful, serious about fun, powered by our Million Data Points, and are all in this together.

Learn More
box2 box2
Our Locations

From San Francisco to Shanghai, Splunkers work in 25+ offices across the globe.

Learn More
box3 box3
Early Talent Program

Intern with people you want to hang out with, even outside the office.

Learn More
box3 box3

Our Blog

Hear from Splunkers on the latest.

Learn More
box2 box2
Diversity & Inclusion

Culture of Inclusion: Splunkers Share Their Stories

Learn More
box1 box1

Follow Splunk on LinkedIn for job announcements, company news, and more.

Learn More