Splunk Senior Threat Hunter (US Remote Available) in San Jose, California
Join us as we pursue our disruptive new vision to make machine data accessible, usable and valuable to everyone. We are a company filled with people who are passionate about our product and seek to deliver the best experience for our customers. At Splunk, we’re committed to our work, customers, having fun and most meaningfully to each other’s success. Learn more about Splunk careers and how you can become a part of our journey!
The Splunk Senior Threat Hunter works with the Sr. Manager of Threat Hunting and Intelligence in our fast-growing Splunk Global Security organization. While this role may be fully remote, preference will be given to candidates either in San Jose or Washington DC. Self starters will love this job, as you will play a key role in the build out of this new service. You will have a highly impactful role with the responsibility of planning and conducting threat hunts. In addition to collaborating with our DMO team to create new detection content. The focus will be on delivering four core capabilities:
Retrospective hunting as new intelligence is gained
Developing an ad-hoc threat hunting library
Leading project-based threat hunts
Applying the output of threat hunts are into new detections and gap assessments
The nature of the work will require dogged persistence to identify advanced adversaries who wish to remain hidden. You are passionate about log analysis, have an ambition to build out a brand new service, as well as develop supporting processes and procedures. Expert level skill in more than one of the following areas is required:
Linux and OSX operating systems
AWS security and logging
General log analysis (firewall, proxy, DNS, email, DHCP, VPN, etc)
Critical thinking and curious mindset are necessary for this role, as finding patterns of suspicious activity in very large datasets is challenging. The successful candidate will be one that enjoys the rush of finding new previously unknown threat actor activity and has the high degree of focus necessary to continue the hunt when there are no easy wins. You will be self-motivated, never sitting idle, but always looking for new work opportunities. The Threat Hunting & Intelligence (THI) team is passionate, has fun everyday, enjoys a good laugh, but above all else loves to hunt threat actors.
Independently plan and conduct threat hunting projects
Collaborate directly with the DMO team on new detection rules
Build positive relationships with both IT and Security architecture to advocate for additional log sources
Develop and maintain a library of ad-hoc threat hunts for other teams to use daily
Demonstrate expertise by uncovering adversary activity not detected by our current detection rules
Actively researching new TTPs from public and internal reporting
Create compelling internal presentations from the results of your work
Creation of detailed process documentation
Bachelor’s degree in computer science, information security or related discipline or equivalent work experience.
8+ years professional IT or IT Security experience; or 6 years and a Master’s degree
2 years or more of experience as a full time incident responder or threat hunter
Proven experience performing advanced searching and reporting with Splunk
Experience with both network and host-based logs
Familiar with both Linux and Mac OSX logging
Understanding of how DNS, DHCP, Email, and other common services work
Ability to reduce large datasets into meaningful information
You will tackle problems with no obvious solutions
Efficient presentation skills for varied audiences including both management and technical
Tenancious attention to detail
Eligible to work in the United States without company sponsorship
We value diversity at our company. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or any other applicable legally protected characteristics in the location in which the candidate is applying.
For job positions in San Francisco, CA, and other locations where required, we will consider for employment qualified applicants with arrest and conviction records.
Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone. Machine data is one of the fastest growing and most complex areas of big data—generated by every component of IT infrastructures, applications, mobile phone location data, website clickstreams, social data, sensors, RFID and much more.
Splunk is focused specifically on the challenges and opportunity of taking massive amounts of machine data, and providing powerful insights from that data. IT insights. Security insights. Business insights. It’s what we call Operational Intelligence.
Since shipping its software in 2006, Splunk now has over 13,000 customers in more than 110 countries around the world. These organizations are using Splunk to harness the power of their machine data to deepen business and customer understanding, mitigate cybersecurity risk, prevent fraud, improve service performance and reduce costs. Innovation is in our DNA – from technology to the way we do business. Splunk is the platform for Operational Intelligence!
Splunk has more than 2,700 global employees, with headquarters in San Francisco, an office in San Jose, CA and regional headquarters in London and Hong Kong.
We’ve built a phenomenal foundation for success with a proven leadership team, highly passionate employees and unique patented software. We invite you to help us continue our drive to define a new industry and become part of an innovative, and disruptive software company.
Benefits & Perks: Wow! This is really cool!
Medical, full company paid Dental, Vision and Life Insurance, Flexible Spending and Dependent Care Accounts, Commuter Accounts, Employee Stock Purchase Plan (ESPP), 401(k), 3 weeks of PTO, sick leave, stocked micro kitchens in Splunk offices, catered lunches on Mondays, catered breakfast on Fridays, basketball hoops, ping pong, arcade games, BBQ’s, soccer, “Fun Fridays”.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
Medical, full company paid Dental, Vision and Life Insurance, Flexible Spending and Dependent Care Accounts, Commuter Accounts, Employee Stock Purchase Plan (ESPP), 401(k), 3 weeks of PTO and sick leave. Our work environments vary by location however we believe in hosting amenities and fun activities to fuel our energy. You may find fully stocked micro kitchens, catered lunches on Mondays and breakfast on Fridays, basketball hoops, ping pong, arcade games, BBQ’s, soccer and “Fun Fridays”.
This isn’t a job – it’s a life changer – are you ready?
Individuals seeking employment at Splunk are considered without regards to race, religion, color, national origin, ancestry, sex, gender, gender identity, gender expression, sexual orientation, marital status, age, physical or mental disability or medical condition (except where physical fitness is a valid occupational qualification), genetic information, veteran status, or any other consideration made unlawful by federal, state or local laws. Click here to review the US Department of Labor’s EEO is The Law notice. Please click here to review Splunk’s Affirmative Action Policy Statement.
Splunk does not discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. Please click here to review Splunk’s Pay Transparency Nondiscrimination Provision.
Splunk is also committed to providing access to all individuals who are seeking information from our website. Any individual using assistive technology (such as a screen reader, Braille reader, etc.) who experiences difficulty accessing information on any part of Splunk’s website should send comments to firstname.lastname@example.org. Please include the nature of the accessibility problem and your e-mail or contact address. If the accessibility problem involves a particular page, the message should include the URL of that page.
Splunk doesn't accept unsolicited agency resumes and won't pay fees to any third-party agency or firm that doesn't have a signed agreement with Splunk.
To check on your application click here.