Offensive Security Engineer
Description
Splunk, a Cisco company, is building a safer and more resilient digital world with an end-to-end full stack platform made for a hybrid, multi-cloud world. Leading enterprises use our unified security and observability platform to keep their digital systems secure and reliable. Our customers love our technology, but it's our caring employees that make Splunk stand out as an amazing career destination. No matter where in the world or what level of the organization, we approach our work with kindness. So bring your work experience, problem-solving skills and talent, of course, but also bring your joy, your passion and all the things that make you, you. Come help organizations be their best, while you reach new heights with a team that has your back.
Role Summary
We are looking for a smart, passionate, and experienced Penetration Tester with a broad range of experience working in dynamic enterprise environments. Do you want to utilize your hard-won offensive security experience to drive security posture improvements across our organization? As a Penetration Tester, you will do that and more!
The Penetration Tester reports to the Sr. Manager of Penetration Testing. This role will be responsible for performing penetration testing, red team assessments, and adversary emulation. The ideal candidate will have previous experience in the following areas: network, web application, and cloud-centric penetration testing. Ability to influence change across functions and apply critical thinking skills are key success factors. Exceptional technical, communication and negotiation skills are necessary for this role, as you will need to provide technical guidance to junior pen testers, perform advanced technical assessments, translate highly technical concepts into business impact and make remediation recommendations.
What you'll get to do
- Prioritize, lead, and perform advanced penetration testing for network, web applications, business application, and cloud infrastructure.
- Guide the team in the development of technical frameworks, tools and execution of pen tests
- Conduct red team assessments and adversary emulation engagements
- Coordinate and execute “Purple teaming” exercises in collaboration with the Security Operations team
- Collaborate with 3rd parties including consulting firms and security researchers on coordinating assessments, validating vulnerability reports/findings and influencing remediation
- Build processes to coordinate pentests and establish remediation cadence cross-functions
- Be a standout colleague who enjoys collaborating with, learning from, mentoring, and teaching other team members to create a positive work environment
- Foster a collaborative environment across a remote team
Must-have Qualifications
- At least 5 years experience in an IT or security function, with at least 3 years of hands-on experience in a penetration testing role
- Experience with Python, PowerShell, or similar scripting language
- Experience using industry standard offensive security tools
- You have proven experience pen testing in web applications, network, wifi and cloud computing solution (AWS, GCP, Kubernetes)
- You have a proficiency with enterprise operating systems, including Linux and Windows
- You have practical experience with assessing encryption, IAM systems, VPN and authentication technologies
- You have extensive knowledge of TCP/IP networking and packet analysis
- You pride yourself on your proven attention to detail
- Excellent, efficient problem-solving skills
- Strong familiarity with at least one of the following: OWASP Top 10, PTES, or NSA Vulnerability and Penetration Testing Standards
- Experience facilitating penetration testing efforts in one or more of the following Compliance frameworks (FedRAMP, PCI, SOCII, HIPAA)
Nice-to-have Qualifications
We’ve taken special care to separate the must-have qualifications from the nice-to-haves. “Nice-to-have” means just that: Nice. To. Have. So, don’t worry if you can’t check off every box. We’re not hiring a list of bullet points–we’re interested in the whole you.
- You have professional-level certifications (OSCP, GPEN, GWAPT, GXPN)
- Experience with higher-level programming languages (C, C++, etc.)
- Experience with API penetration testing
- Experience with containerization offensive techniques
- Exploit development, vulnerability research, bug bounty submissions
Splunk is an Equal Opportunity Employer
At Splunk, we believe creating a culture of belonging isn’t just the right thing to do; it’s also the smart thing. We prioritize diversity, equity, inclusion, and belonging to ensure our employees are supported to bring their best, most authentic selves to work where they can thrive. Qualified applicants receive consideration for employment without regard to race, religion, color, national origin, ancestry, sex, gender, gender identity, gender expression, sexual orientation, marital status, age, physical or mental disability or medical condition, genetic information, veteran status, or any other consideration made unlawful by federal, state, or local laws. We consider qualified applicants with criminal histories, consistent with legal requirements.
Thank you for your interest in Splunk!