Offensive Security Engineer
Description
Role Summary
What you'll get to do
- Prioritize, lead, and perform advanced penetration testing for network, web applications, business application, and cloud infrastructure.
- Guide the team in the development of technical frameworks, tools and execution of pen tests
- Conduct red team assessments and adversary emulation engagements
- Coordinate and execute “Purple teaming” exercises in collaboration with the Security Operations team
- Collaborate with 3rd parties including consulting firms and security researchers on coordinating assessments, validating vulnerability reports/findings and influencing remediation
- Build processes to coordinate pentests and establish remediation cadence cross-functions
- Be a standout colleague who enjoys collaborating with, learning from, mentoring, and teaching other team members to create a positive work environment
- Foster a collaborative environment across a remote team
Must-have Qualifications
- At least 5 years experience in an IT or security function, with at least 3 years of hands-on experience in a penetration testing role
- Experience with Python, PowerShell, or similar scripting language
- Experience using industry standard offensive security tools
- You have proven experience pen testing in web applications, network, wifi and cloud computing solution (AWS, GCP, Kubernetes)
- You have a proficiency with enterprise operating systems, including Linux and Windows
- You have practical experience with assessing encryption, IAM systems, VPN and authentication technologies
- You have extensive knowledge of TCP/IP networking and packet analysis
- You pride yourself on your proven attention to detail
- Excellent, efficient problem-solving skills
- Strong familiarity with at least one of the following: OWASP Top 10, PTES, or NSA Vulnerability and Penetration Testing Standards
- Experience facilitating penetration testing efforts in one or more of the following Compliance frameworks (FedRAMP, PCI, SOCII, HIPAA)
Nice-to-have Qualifications
- You have professional-level certifications (OSCP, GPEN, GWAPT, GXPN)
- Experience with higher-level programming languages (C, C++, etc.)
- Experience with API penetration testing
- Experience with containerization offensive techniques
- Exploit development, vulnerability research, bug bounty submissions
Note:
Base Pay Range
Costa Rica
Base Pay: CRC 24,000,000.00 - 33,000,000.00 per year
Splunk provides flexibility and choice in the working arrangement for most roles, including remote and/or in-office roles. We have a market-based pay structure which varies by location. Please note that the base pay range is a guideline and for candidates who receive an offer, the base pay will vary based on factors such as work location as set out above, as well as the knowledge, skills and experience of the candidate. In addition to base pay, this role is eligible for incentive compensation and may be eligible for equity or long-term cash awards.
Benefits are an important part of Splunk's Total Rewards package. This role is eligible for a comprehensive, competitive benefits package which may include healthcare and retirement plans, paid time off, wellbeing expense reimbursement, and much more! Learn more about our next-level benefits at https://splunkbenefits.com.
Thank you for your interest in Splunk!