Senior Threat Hunter (US Remote Available)

Security and Risk Management San Jose, California


Join us as we pursue our disruptive new vision to make machine data accessible, usable and valuable to everyone. We are a company filled with people who are passionate about our product and seek to deliver the best experience for our customers. At Splunk, we’re committed to our work, customers, having fun and most meaningfully to each other’s success. Learn more about Splunk careers and how you can become a part of our journey!

Role

The Splunk Senior Threat Hunter works with the Sr. Manager of Threat Hunting and Intelligence in our fast-growing Splunk Global Security organization. While this role may be fully remote, preference will be given to candidates either in San Jose or Washington DC. Self starters will love this job, as you will play a key role in the build out of this new service. You will have a highly impactful role with the responsibility of planning and conducting threat hunts. In addition to collaborating with our DMO team to create new detection content. The focus will be on delivering four core capabilities:

  • Retrospective hunting as new intelligence is gained
  • Developing an ad-hoc threat hunting library
  • Leading project-based threat hunts
  • Applying the output of threat hunts are into new detections and gap assessments

The nature of the work will require dogged persistence to identify advanced adversaries who wish to remain hidden. You are passionate about log analysis, have an ambition to build out a brand new service, as well as develop supporting processes and procedures. Expert level skill in more than one of the following areas is required:

  • Splunk platform
  • Linux and OSX operating systems
  • AWS security and logging
  • General log analysis (firewall, proxy, DNS, email, DHCP, VPN, etc)

Critical thinking and curious mindset are necessary for this role, as finding patterns of suspicious activity in very large datasets is challenging. The successful candidate will be one that enjoys the rush of finding new previously unknown threat actor activity and has the high degree of focus necessary to continue the hunt when there are no easy wins. You will be self-motivated, never sitting idle, but always looking for new work opportunities. The Threat Hunting & Intelligence (THI) team is passionate, has fun everyday, enjoys a good laugh, but above all else loves to hunt threat actors.

Responsibilities

  • Independently plan and conduct threat hunting projects
  • Collaborate directly with the DMO team on new detection rules
  • Build positive relationships with both IT and Security architecture to advocate for additional log sources
  • Develop and maintain a library of ad-hoc threat hunts for other teams to use daily
  • Demonstrate expertise by uncovering adversary activity not detected by our current detection rules
  • Actively researching new TTPs from public and internal reporting
  • Create compelling internal presentations from the results of your work
  • Creation of detailed process documentation

Requirements

  • Bachelor’s degree in computer science, information security or related discipline or equivalent work experience.
  • 8+ years professional IT or IT Security experience; or 6 years and a Master’s degree
  • 2 years or more of experience as a full time incident responder or threat hunter
  • Proven experience performing advanced searching and reporting with Splunk
  • Experience with both network and host-based logs
  • Familiar with both Linux and Mac OSX logging
  • Understanding of how DNS, DHCP, Email, and other common services work
  • Ability to reduce large datasets into meaningful information
  • You will tackle problems with no obvious solutions
  • Efficient presentation skills for varied audiences including both management and technical
  • Tenancious attention to detail
  • Eligible to work in the United States without company sponsorship


We value diversity at our company. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or any other applicable legally protected characteristics in the location in which the candidate is applying.

For job positions in San Francisco, CA, and other locations where required, we will consider for employment qualified applicants with arrest and conviction records.

Thank you for your interest in Splunk!