Join us as we pursue our disruptive new vision to harness machine data in the next generation of security analytics products! We are a company filled with people who are passionate about our products and seek to deliver the best experience for our customers. At Splunk, we’re committed to our work, customers, having fun and commemorating each other’s success.

Splunk's Security Content Engineering team is seeking security administrators, integrators, and professionals to define the data transformations and normalizations needed to map security data from hundreds of Splunk supported data sources to our security semantic model. This model contains the security object definitions used by Splunk, partners, and customers to develop detection analytics against. These analytics power our market leading security products: Splunk Enterprise Security and Splunk User Behavior Analytics, which help security analysts to quickly identify and mitigate the ongoing time-sensitive threats, attack methods, and other security issues that our customers face. Your work will have an immediate positive effect on thousands of customers in their cyber defense systems. 

What you'll do

  • Use your security data domain expertise to contribute to the definition of our security semantic layer
  • Collaborate with teammates, Product Management, and the Security Research team on how to successfully implement security detections 
  • Analyze the information provided in machine generated logs and metrics coming from IT and security systems, then define the specific data transformations and normalization of fields as part of our security semantic layer. Using a high level programming language, you will codify these definitions used by our Splunk security products
  • Setup security systems in our lab to generate representative data which will be used for security analysis. Once setup, you will be creating automation scripts against third party interfaces to enable automation of this data generation
  • Investigate and solve customer and partner issues in a timely manner
  • Mentor junior engineers of the team

What you'll need

  • 6+ years of experience in one or more of the following areas: Security system management, enterprise or infrastructure management, security analytic definition work
  • Experience with Splunk or other SIEM/Log Management tools, a working knowledge of Splunk SPL (Search Processing Language) is a plus
  • Experience with automation or full stack programming 
  • Excellent problem solving and analytical thinking skills
  • BA/BS preferred in computer science, computer engineering, information technology, mathematics or an equivalent work experience

We are an equal opportunity employer and value diversity at our company. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.

 
Splunk's Hiring Practices
Splunk turns machine data into answers. Organizations use market-leading Splunk solutions with machine learning to solve their toughest IT, Internet of Things and security challenges.

Individuals seeking employment at Splunk are considered without regards to race, religion, color, national origin, ancestry, sex, gender, gender identity, gender expression, sexual orientation, marital status, age, physical or mental disability or medical condition (except where physical fitness is a valid occupational qualification), genetic information, veteran status, or any other consideration made unlawful by federal, state or local laws. Click here to review the US Department of Labor’s EEO is The Law notice. Please click here to review Splunk’s Affirmative Action Policy Statement.

Splunk also has policies in place to protect the personal information candidates disclose to us as part of the application process. Please click here to review Splunk’s Career Site Privacy Policy.

Splunk does not discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. Please click here to review Splunk’s Pay Transparency Nondiscrimination Provision. 
 
For job positions in San Francisco, CA, and other locations where required, we will consider for employment qualified applicants with arrest and conviction records.

Splunk is also committed to providing access to all individuals who are seeking information from our website. Any individual using assistive technology (such as a screen reader, Braille reader, etc.) who experiences difficulty accessing information on any part of Splunk’s website should send comments to accessiblecareers@splunk.com. Please include the nature of the accessibility problem and your e-mail or contact address. If the accessibility problem involves a particular page, the message should include the URL of that page.

Splunk doesn't accept unsolicited agency resumes and won't pay fees to any third-party agency or firm that doesn't have a signed agreement with Splunk.

To check on your application click here.
 
DIVE DEEPER
Find out what makes Splunk such a great place to work
Our Values

Splunkers are encouraged and empowered to be Innovative, Passionate, Disruptive, Open and Fun.
Learn More

Our Locations

From San Francisco to Shanghai, Splunkers work in 25+ offices across the globe.
Learn More

University Recruiting Program

Intern with people you want to hang out with, even outside the office.
Learn More

Our Blog

Hear from Splunkers on the latest.
Learn More

Diversity & Inclusion

Culture of Inclusion: Splunkers Share Their Stories
Learn More

LinkedIn

Follow Splunk on LinkedIn for job announcements, company news, and more.
Learn More