false
Security and Risk Management

Director, Splunk Security Center of Excellence

Join us as we pursue our exciting new vision to make machine data accessible, usable and valuable to everyone. Splunk is a company filled with people who are passionate about our product and seek to deliver the best experience for our customers. At Splunk, we’re committed to our work, customers, having fun and most importantly to each other’s success. Learn more about Splunk careers and how you can become a part of our journey!

About the Role

We’re looking for a technically grounded and systems-minded leader to run our Splunk Security Center of Excellence (SSCOE) — the internal team responsible for scaling, sustaining, and evolving a best-in-class Splunk environment. The SSCOE powers our Global Security Operations (GSO) team and serves as a hands-on example of how Splunk can drive real security outcomes at scale.
 
You’ll lead strategy and execution across Splunk product operations, search engineering, and SOAR automation, while shaping our internal practices and influencing the future of Splunk products through operational insight. This role blends engineering depth, operational awareness, and people leadership — all within an environment that values experimentation, learning, and practical outcomes.
 
You’ll work across time zones and functions, managing senior technical leaders and partnering closely with Security Operations, Product Management, Engineering, and Customer Success.

Key Responsibilities

  • Direct the Splunk Security Center of Excellence (SSCOE) across three core teams:
  • Splunk Product Operations – responsible for the daily health and stability of our Splunk platforms, including upgrades, support, and service delivery.
  • Search Engineering – focused on scaling the environment through capacity planning, SPL optimization, data modeling, and architectural improvements.
  • SOAR Automation – delivering orchestration capabilities that enable faster, more consistent security operations across environments.
  • Ensure alignment between the SSCOE and broader security strategy, infrastructure reliability, and product adoption goals.
  • Partner with detection engineering, incident response, and threat hunting teams to improve outcomes through smarter data, better content, and more effective automation.
  • Establish and maintain key metrics that measure platform reliability, engineering impact, and service quality.
  • Provide operational feedback that helps shape product roadmaps, drawing on direct experience with complex Splunk deployments.
  • Represent our Splunk environment externally — through SOC tours, technical deep dives, and discussions with customers and partners.
  • Evolve internal processes, standards, and tooling using a combination of ITIL, SRE, and automation practices.
  • Hire, support, and grow technical managers and individual contributors across geographies and specialties.

What We’re Looking For

  • 10+ years in Security Operations, Engineering, or Platform roles, with 5+ years managing cross-functional or multi-disciplinary teams.
  • Deep experience with Splunk — including Splunk Cloud, Enterprise, ES, and SOAR — and a track record of maintaining and evolving complex deployments.
  • Confidence managing both operational reliability and engineering scale, with awareness of how they intersect.
  • A strategic thinker who balances near-term needs with long-term systems design.
  • Experience working across boundaries — partnering with security, product, and engineering teams to drive shared outcomes.
  • Familiarity with frameworks like ITIL and SRE, and how they apply in practical, real-world settings.
  • Strong communicator, capable of moving between detailed technical discussions and high-level briefings.
  • A thoughtful leader who invests in team growth, inclusion, and continuous learning.
  • Bonus: Hands-on experience with COE programs or acting as a “Customer Zero” for security tooling and platforms.

Why This Role Matters

This role sits at the intersection of engineering, operations, and security — with the chance to influence not only how Splunk works inside our environment, but how it’s seen by customers around the world. You’ll have real ownership, real impact, and a team of curious, capable professionals ready to build something great with you.
 

Splunk is an Equal Opportunity Employer

At Splunk, we believe creating a culture of belonging isn’t just the right thing to do; it’s also the smart thing. We prioritize diversity, equity, inclusion, and belonging to ensure our employees are supported to bring their best, most authentic selves to work where they can thrive. Qualified applicants receive consideration for employment without regard to race, religion, color, national origin, ancestry, sex, gender, gender identity, gender expression, sexual orientation, marital status, age, physical or mental disability or medical condition, genetic information, veteran status, or any other consideration made unlawful by federal, state, or local laws. We consider qualified applicants with criminal histories, consistent with legal requirements.

 

 

 

 

Note:

Base Pay Range

SF Bay Area, Seattle Metro, and New York City Metro Area

Base Pay Range: $212,400.00 - 292,050.00 per year

California (excludes SF Bay Area), Washington (excludes Seattle Metro), Washington DC Metro, and Massachusetts

Base Pay Range: $191,160.00 - 262,845.00 per year

All other cities and states excluding California, Washington, Massachusetts, New York City Metro Area and Washington DC Metro Area.

Base Pay Range: $172,000.00 - 236,500.00 per year

Splunk provides flexibility and choice in the working arrangement for most roles, including remote and/or in-office roles. We have a market-based pay structure which varies by location. Please note that the base pay range is a guideline and for candidates who receive an offer, the base pay will vary based on factors such as work location as set out above, as well as the knowledge, skills and experience of the candidate. In addition to base pay, this role is eligible for incentive compensation and may be eligible for equity or long-term cash awards.

Benefits are an important part of Splunk's Total Rewards package. This role is eligible for a competitive benefits package which includes medical, dental, vision, a 401(k) plan and match, paid time off and much more! Learn more about our next-level benefits at https://splunkbenefits.com.

Splunk's Hiring Practices

Splunk turns machine data into answers. Organizations use market-leading Splunk solutions with machine learning to solve their toughest IT, Internet of Things and security challenges.

We value diversity, equity, and inclusion at Splunk and are committed to equal employment opportunity. Qualified applicants receive consideration for employment without regard to race, religion, color, national origin, ancestry, sex, gender, gender identity, gender expression, sexual orientation, marital status, age, physical or mental disability or medical condition, genetic information, veteran status, or any other consideration made unlawful by federal, state or local laws. We consider qualified applicants with criminal histories, consistent with legal requirements. Click here to review the US Department of Labor’s EEO is The Law notice. Please click here to review Splunk’s Affirmative Action Policy Statement. If you need assistance or an accommodation to apply or during the hiring process, please let us know by completing our Accommodation Request form.

Splunk also has policies in place to protect the personal information candidates disclose to us as part of the application process. Please click here to review Splunk’s Career Site Privacy Policy.

Splunk does not discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. Please click here to review Splunk’s Pay Transparency Nondiscrimination Provision.

Splunk is committed to the health and safety of our employees and customers. Splunk is impacted by the mandates outlined for U.S. Government contractors in President Biden’s Path out of the Pandemic: COVID-19 Action Plan. As a result, Splunk requires U.S. employees, whether assigned to an office or 100% remote, to provide proof of full vaccination, as defined by the CDC. Splunk provides reasonable accommodations for employees who have qualifying medical or religious reasons.

Splunk is also committed to providing access to all individuals who are seeking information from our website. Any individual using assistive technology (such as a screen reader, Braille reader, etc.) who experiences difficulty accessing information on any part of Splunk’s website should send comments to accessiblecareers@splunk.com. Please include the nature of the accessibility problem and your e-mail or contact address. If the accessibility problem involves a particular page, the message should include the URL of that page.

Splunk doesn't accept unsolicited agency resumes and won't pay fees to any third-party agency or firm that doesn't have a signed agreement with Splunk.

To check on your application click here.

DIVE DEEPER

Find out what makes Splunk such a great place to work

box1 box1
Our Values

Splunkers are encouraged and empowered to be Innovative, passionate, disruptive, open and fun.

Learn More
box2 box2
Benefits and Wellbeing

Our benefits are designed to support your physical, financial, emotional and mental wellbeing.

Explore Splunk Benefits
box3 box3
Early Talent Program

Intern with people you want to hang out with, even outside the office.

Learn More
box3 box3

Our Blog

Hear from Splunkers on the latest.

Read the Blog
box2 box2
Diversity, Equity, Inclusion & Belonging

Learn about Splunk’s commitment to creating a culture of belonging.

See Our Approach
box1 box1
LinkedIn

Follow Splunk on LinkedIn for job announcements, company news and more.

Follow Us