Security Threat Researcher
Description
- Stay informed about the current phishing landscape and develop effective detections to protect our customers.
- Review a large number of potential phishing websites daily to determine if new detections need to be created, or existing detections need tuning
- Collaborate with developers to identify and resolve issues, missing features, and enhance phishing-related detection capabilities.
- Investigate and respond to detection related issues reported by customers.
- Minimum 2 years of experience as a detection engineer, security researcher, or threat analyst.
- Bachelor’s degree in Computer Science or a related quantitative field (equivalent education/experience considered).
- Deep understanding of the modern phishing landscape, including threat actors, phishing kits, AITM/Reverse Proxy frameworks, and related techniques.
- Proficiency in writing phishing detections using various technologies (e.g., Regex,, ClamAV, Suricata).
- Expertise in creating complex regular expressions for detection.
- Familiarity with typical phishing kit structures.
- In-depth knowledge of HTML, Javascript, and the HTTP protocol.
- Proficiency in JSON.
- Excellent verbal and written communication skills.
- Knowledge of common network protocols (FTP, SMTP).
- Proficiency in Python or Go
- Familiarity with the MITRE ATT&CK Framework and other relevant attacker tactics, techniques, and procedures (TTPs).
Splunk is an Equal Opportunity Employer: At Splunk, we believe creating a culture of belonging isn’t just the right thing to do; it’s also the smart thing. We prioritize diversity, equity, inclusion, and belonging to ensure our employees are supported to bring their best, most authentic selves to work where they can thrive. Qualified applicants receive consideration for employment without regard to race, religion, color, national origin, ancestry, sex, gender, gender identity, gender expression, sexual orientation, marital status, age, physical or mental disability or medical condition, genetic information, veteran status, or any other consideration made unlawful by federal, state, or lo
Note:
Base Pay Range
SF Bay Area, Seattle Metro, and New York City Metro Area
Base Pay Range: $146,400.00 - 201,300.00 per year
California (excludes SF Bay Area), Washington (excludes Seattle Metro), Washington DC Metro, and Massachusetts
Base Pay Range: $131,760.00 - 181,170.00 per year
All other cities and states excluding California, Washington, Massachusetts, New York City Metro Area and Washington DC Metro Area.
Base Pay Range: $117,120.00 - 161,040.00 per year
Splunk provides flexibility and choice in the working arrangement for most roles, including remote and/or in-office roles. We have a market-based pay structure which varies by location. Please note that the base pay range is a guideline and for candidates who receive an offer, the base pay will vary based on factors such as work location as set out above, as well as the knowledge, skills and experience of the candidate. In addition to base pay, this role is eligible for incentive compensation and may be eligible for equity or long-term cash awards.
Benefits are an important part of Splunk's Total Rewards package. This role is eligible for a competitive benefits package which includes medical, dental, vision, a 401(k) plan and match, paid time off and much more! Learn more about our next-level benefits at https://splunkbenefits.com.
Thank you for your interest in Splunk!