false
Program / Project Management

Technical Programs and Incidents Manager - Security Products

Technical Programs and Incidents Manager - Security Products
 
Splunk, a Cisco company, is building a safer and more resilient digital world with an end-to-end full stack platform made for a hybrid, multi-cloud world. Leading enterprises use our unified security and observability platform to keep their digital systems secure and reliable. Our customers love our technology, but it's our caring employees that make Splunk stand out as an amazing career destination. No matter where in the world or what level of the organization, we approach our work with kindness. So bring your work experience, problem-solving skills and talent, of course, but also bring your joy, your passion and all the things that make you, you. Come help organizations be their best, while you reach new heights with a team that has your back.

Role Summary

Join us in the forefront of innovation in SecOps. We are a company filled with people who are passionate about our product and seek to deliver the best experience for our customers. At Splunk, we’re committed to our work, customers, having fun and most importantly to each other’s success!
We are looking for a Principal Technical Program and Incidents Manager, who will be responsible for leading large-scale, sophisticated programs from start to end with a focus on strengthening our relationship with Incident Management teams and improving critical triage within our Security Products organization. You will work cross-functionally with technical and business partners to drive strategic outcomes and ensure operational resilience. We want a TPM who can thrive with a nebulous problem set, distill sophisticated problems into concrete work, and guide multiple teams with their strong, critical thinking skills.

What you'll get to do:

  • Leading technical programs in the Products & Technology organization, with an understanding of the company priorities to drive strategic outcomes, including New Product Introduction (NPI) and Go To Market (GTM) processes
  • Lead a small team of incident commanders
  • Breaking down initiatives into coherent work-streams; defining program timelines and ensuring accountability of program goals; operating as the single source of truth in execution of sophisticated programs
  • Proactively anticipating risks, partnering with program collaborators to develop mitigation plans, and driving them to resolution
  • Aligning with organizational leadership and key collaborators as a program lead
  • Understanding system interdependencies and facilitating technical discussions; communicating solutions and decisions with both technical and non-technical audiences
  • Creating and maintaining detailed and easy-to-digest program documentation, managing dependencies, and tracking status across multiple teams and work-streams
  • Act as the primary agent connecting the Splunk Problem, Incident, and Escalation team with Security Engineering
  • Coordinate Cross-Functional teams to address and resolve incidents effectively
  • Conduct and manage post-incident reviews to identify root causes and ensure preventative measures are implemented
  • Facilitate technical discussions, communicate solutions and decisions with both technical and non-technical audiences
  • Align with organizational leadership and key collaborators as a Technical Program Management and Technical Incident Leader.

Must-have Qualifications:

  • 10+ years experience in software program management or closely related roles
  • Experience working with customers and customer escalations
  • Experience with mitigating customer related concerns
  • Have built and run an escalation management program
  • Bachelor’s/Master’s degree in a technical field or equivalent experience
  • Experience with enterprise software and cloud technologies, along with a deep understanding of the software development lifecycle
  • Experience driving large, cross-functional programs that have broad organizational impact
  • Demonstrated ability of juggling multiple, concurrent programs and prioritizing tasks based on criticality
  • Communication and risk management are your forte. You can communicate effectively with collaborators of all levels and develop plans to act upon risks appropriately
  • Great decision making, consensus building, and problem solving; you don't shy away from challenges
  • Experience influencing and affecting change at many levels of the organization without having positional authority.
  • Strong technical proficiency required to understand engineering tasks and identify and resolve issues as they arise

Nice-to-have Qualifications:

  • Experience in customer-facing roles, support roles, and demonstrated leadership capabilities
  • Experience leading organizational change around ensuring a “Customer First” approach
  • Familiarity with Security and Observability products. Particularly around SIEM, UEBA, and SOAR space
We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.

Splunk is an Equal Opportunity Employer

Splunk, a Cisco company, is an Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, genetic information, age, disability, veteran status, or any other legally protected basis.
 
Annual Base Pay: $152,600 - $220,900 USD
 
Employees receive up to twelve paid holidays per calendar year, which includes one floating holiday (for non-exempt employees), plus a day off for their birthday. Non-Exempt new hires accrue up to 16 days of vacation time off each year, at a rate of 4.92 hours per pay period. Exempt new hires participate in Cisco’s flexible Vacation Time Off policy, which does not place a defined limit on how much vacation time eligible employees may use but is subject to availability and some business limitations. All new hires are eligible for Sick Time Off subject to Cisco’s Sick Time Off Policy and will have eighty (80) hours of sick time off provided on their hire date and on January 1st of each year thereafter.  Up to 80 hours of unused sick time will be carried forward from one calendar year to the next such that the maximum number of sick time hours an employee may have available is 160 hours. Employees in Illinois have a unique time off program designed specifically with local requirements in mind. All employees also have access to paid time away to deal with critical or emergency issues. We offer additional paid time to volunteer and give back to the community.
Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components. For quota-based incentive pay, Cisco typically pays as follows:

.75% of incentive target for each 1% of revenue attainment up to 50% of quota;
1.5% of incentive target for each 1% of attainment between 50% and 75%;
1% of incentive target for each 1% of attainment between 75% and 100%; and once performance exceeds 100% attainment, incentive rates are at or above 1% for each 1% of attainment with no cap on incentive compensation.

For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid.

Splunk's Hiring Practices

Splunk turns machine data into answers. Organizations use market-leading Splunk solutions with machine learning to solve their toughest IT, Internet of Things and security challenges.
 
Splunk, a Cisco company, is an Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, genetic information, age, disability, veteran status, or any other legally protected basis. We consider qualified applicants with criminal histories, consistent with legal requirements. Click here to review the US Department of Labor’s EEO is The Law notice. If you need assistance or an accommodation to apply or during the hiring process, please let us know by completing our Accommodation Request form.
 
Splunk also has policies in place to protect the personal information candidates disclose to us as part of the application process. Please click here to review Splunk’s Career Site Privacy Policy.

Splunk does not discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. Please click here to review Splunk’s Pay Transparency Nondiscrimination Provision.

Splunk is committed to the health and safety of our employees and customers. Splunk is impacted by the mandates outlined for U.S. Government contractors in President Biden’s Path out of the Pandemic: COVID-19 Action Plan. As a result, Splunk requires U.S. employees, whether assigned to an office or 100% remote, to provide proof of full vaccination, as defined by the CDC. Splunk provides reasonable accommodations for employees who have qualifying medical or religious reasons.

Splunk is also committed to providing access to all individuals who are seeking information from our website. Any individual using assistive technology (such as a screen reader, Braille reader, etc.) who experiences difficulty accessing information on any part of Splunk’s website should send comments to accessiblecareers@splunk.com. Please include the nature of the accessibility problem and your e-mail or contact address. If the accessibility problem involves a particular page, the message should include the URL of that page.

Splunk doesn't accept unsolicited agency resumes and won't pay fees to any third-party agency or firm that doesn't have a signed agreement with Splunk.

To check on your application click here.