Skip to main content
Security and Risk Management

Security Automation Engineer

  • - Hybrid Remote

Join us as we pursue our exciting new vision to make machine data accessible, usable and valuable to everyone. We are a company filled with people who are passionate about our product and seek to deliver the best experience for our customers. At Splunk, we’re committed to our work, customers, having fun and most importantly to each other’s success. Learn more about Splunk careers and how you can become a part of our journey!

Role Summary

In this role, you will be responsible for developing, troubleshooting, and debugging SOAR playbooks and connectors. You will have a deep understanding of Information Security principles coupled with a solid grasp of python language and a strong desire to learn and grow within the automation space. The SOAR Engineer will be part of the Cybersecurity Centre of Excellence team and will be a key member in efforts to automate Security Operations Center, Incident Response and Threat Hunting processes. This is a hardworking team who has fun, enjoys a good laugh but above all else thinks security first!

What you'll get to do

  • Work closely with the Security Operations Center (SOC), Incident Response and Security Engineering teams to craft, develop and improve existing automation and deliver resilient security solutions.
  • Assess, design, and improve SOC processes and workflows with a focus on integrating automation through Splunk SOAR and CICD platforms.
  • Integrate new logging sources and build playbooks to accurately prioritize and respond to security incidents while reducing the time needed to analyze each event.
  • Develop custom scripts to automate current detection and response workflows.
  • Analyze SOC alerts statistics and workflows to reduce false positives and accurately focus engineering efforts.
  • Develop repeatable processes to develop and troubleshoot playbooks.
  • Guide, train and coach other members on the team against security and DevOps best practices.

Must-have Qualifications

  • Bachelor’s degree and 1+ years of experience with information security in a professional work.
  • 2+ years of experience with Cybersecurity technologies, protocols, applications with focus on one or more of the following Cybersecurity areas such as SIEM, IDR, firewalls, forensics, data logging and IAM.
  • 1+ years of experience in tool integrations, CI/CD and REST APIs
  • 1+ years of software development experience with Python, Golang, JavaScript, or similar.
  • Experience in Phantom / Splunk SOAR, including developing playbooks, troubleshooting, training, or supporting technical requests.
  • Experience working with Splunk to search through data, craft reports and design dashboards.
  • Fully proficient in git and version control systems like GitLab and GitHub
  • Experience developing tools to enable cyber security teams.
  • Skilled in Linux administration and Cloud Technologies, such as AWS.
  • Excellent communication skills, both verbal and written; able to explain intricate technical topics to varying groups.

Nice-to-have Qualifications

  • Prior experience within Vulnerability Management, Security Operations, Incident Response, and Threat Intelligence domains.
  • Experience working in a DevSecOps role to enable the business while keeping products secure.

Splunk is an Equal Opportunity Employer

At Splunk, we believe creating a culture of belonging isn’t just the right thing to do; it’s also the smart thing. We prioritize diversity, equity, inclusion, and belonging to ensure our employees are supported to bring their best, most authentic selves to work where they can thrive. Qualified applicants receive consideration for employment without regard to race, religion, color, national origin, ancestry, sex, gender, gender identity, gender expression, sexual orientation, marital status, age, physical or mental disability or medical condition, genetic information, veteran status, or any other consideration made unlawful by federal, state, or local laws. We consider qualified applicants with criminal histories, consistent with legal requirements.



Splunk's Hiring Practices
Splunk turns machine data into answers. Organizations use market-leading Splunk solutions with machine learning to solve their toughest IT, Internet of Things and security challenges.

We value diversity, equity, and inclusion at Splunk and are an equal employment opportunity employer. Qualified applicants receive consideration for employment without regard to race, religion, color, national origin, ancestry, sex, gender, gender identity, gender expression, sexual orientation, marital status, age, physical or mental disability or medical condition, genetic information, veteran status, or any other consideration made unlawful by federal, state, or local laws. We consider qualified applicants with criminal histories, consistent with legal requirements. Click here to review the US Department of Labor’s EEO is The Law notice. Please click here to review Splunk’s Equal Employment Opportunity Policy Statement. If you need assistance or an accommodation to apply or during the hiring process, please let us know by completing our Accommodation Request form.

Splunk also has policies in place to protect the personal information candidates disclose to us as part of the application process. Please click here to review Splunk’s Career Site Privacy Policy.

Splunk does not discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. Please click here to review Splunk’s Pay Transparency Nondiscrimination Provision.

Splunk is committed to the health and safety of our employees and customers. We comply with local, state/territory, and federal regulations to prevent the spread of COVID-19 in the countries in which we operate. Splunk provides reasonable medical, religious, or other legally required accommodations for eligible employees.

Splunk is also committed to providing access to all individuals who are seeking information from our website. Any individual using assistive technology (such as a screen reader, Braille reader, etc.) who experiences difficulty accessing information on any part of Splunk’s website should send comments to accessiblecareers@splunk.com. Please include the nature of the accessibility problem and your e-mail or contact address. If the accessibility problem involves a particular page, the message should include the URL of that page.

Splunk doesn't accept unsolicited agency resumes and won't pay fees to any third-party agency or firm that doesn't have a signed agreement with Splunk.

DIVE DEEPER

Find out what makes Splunk such a great place to work

box1 box1
Our Values

Splunkers are encouraged and empowered to be Innovative, passionate, disruptive, open and fun.

Learn More
box2 box2
Benefits and Wellbeing

Our benefits are designed to support your physical, financial, emotional and mental wellbeing.

Explore Splunk Benefits
box3 box3
Early Talent Program

Intern with people you want to hang out with, even outside the office.

Learn More
box3 box3

Our Blog

Hear from Splunkers on the latest.

Read the Blog
box2 box2
Diversity, Equity, Inclusion & Belonging

Learn about Splunk’s commitment to creating a culture of belonging.

See Our Approach
box1 box1
LinkedIn

Follow Splunk on LinkedIn for job announcements, company news, and more.

Follow Us