Sr. Manager, Detection Engineering (US Remote Available)

Security and Risk Management San Francisco, California Austin, Texas Seattle, Washington Los Angeles, CA, California McLean, Virginia San Jose, California


Role:

The Senior Manager, Detection Operations reports to the Director of Detection and Monitoring Operations. The role is based in San Francisco, San Jose, McLean, VA, or Remote. In this role, you will be responsible for leading a team of high-performing detection engineers poised to build content for the proactive defense of Splunk. You will have a deep understanding of Information Security principles coupled with the expertise in developing and prioritizing detection content. We are a hardworking team who has fun, enjoys a good laugh but above all else thinks security first.

Responsibilities:

  • Lead day-to-day operations of the Splunk Detection Operations team to drive prioritization of content creation, develop robust processes to track intake and consistency, and mature the team to build detections beyond Splunk
  • Engage with other teams to ensure detections are working as intended
  • Identify and incorporate new data sources and their applicability to the detection of sophisticated adversaries
  • Lead efforts to ensure data sources are aligned with Splunk’s Common Information Model (CIM)
  • Develop intimate familiarity with the service offering to drive service improvement initiatives across the team
  • Partner with other security organizations to lead standards development across several multi-functional service areas
  • Continue to champion the remediation of visibility and capability gaps and break down roadblocks standing in the way of a robust security posture
  • Understand & manage development backlog to ensure a steady stream of activities
  • Provide mentorship for willing and able candidates looking to dive into security content development
  • Capture development metrics in direct support to executive-level briefings (daily, weekly, monthly)
  • Ensure that all documents, workflows, and processes remain accurate and up-to-date

Requirements:

  • At least 3 years managing a detection engineering, incident response, security engineering, or similar team
  • Advanced Splunk Enterprise Security experience
  • Ability to build and interpret Splunk Processing Language (SPL) fluidly
  • Detailed understanding of the MITRE ATT&CK Framework and/or the Cyber Kill Chain
  • Advanced understanding of attacks impacting a cloud native environment
  • You can lead people to think critically by guiding them without doing the work for them
  • You possess a demonstrated ability to speak with people with varying knowledge of IT Security concepts
  • Capability to look at a process to find opportunities for cycle-time reduction
  • Ability to multitask, prioritize and take-charge
  • Ability and desire to think outside of the box for creative solutions to problems with the moxie to follow-through
  • Excellent interpersonal skills and ability to see things through the customer’s eyes
  • Tremendous attention to detail
  • Eligible to work in the United States without company sponsorship

Thank you for your interest in Splunk!