Senior Security Automation Engineer (US Remote Available)

Splunk San Jose , CA 95111

Posted 2 weeks ago

Join us as we pursue our exciting new vision to make machine data accessible, usable and valuable to everyone. We are a company filled with people who are passionate about our product and who seek to deliver the best experience for our customers. At Splunk, we're committed to our work, our customers, having fun, and most significantly by contributing to each other's success. Learn more about Splunk careers and how you can become a part of our journey.

Role

As a member of the Security Engineering team, you will collaborate with other security teams to execute on strategic plans and develop tactical execution methodologies which improve the "protect, detect, and respond" capabilities of Splunk's Global Security Team.

The ideal candidate has a passion for developing security solutions and capabilities that enable Splunk Global Security to protect our organization, people, and assets. You will collaborate with our engineers, operations teams, incident responders, and threat intel teams, as well as our security solution providers, to help them maximize the capabilities of Phantom and achieve success.

Our Security Solution Engineers work with our teams to realize the potential of Security Automation & Orchestration (SOAR) by developing advanced playbooks and new integrations with a wide range of security technologies and services. The role involves not only developing the solutions but working with our internal customers and partners to improve their projects by providing mentorship on how to resolve technical issues and challenges. The ideal candidate enjoys the challenge of solving complex problems and seeing results that generate success.

The SOAR playbooks are the codification of a Splunk's security operations plan. Playbooks hook into the Phantom platform and all of its capabilities in order to execute these actions, ensuring a repeatable and auditable process around security operations.

Responsibilities

You will provide engineering and operational support for cutting edge security tools, as well as deploying and running services that make full use of both private and public cloud services. This security engineering professional role is responsible for Planning, Design, Testing, Deployment/Implementation, Break/Fix, Patching, Change Control and Service Maintenance/Support/Updates of high complex security systems to fulfill Splunk's business needs. You will provide engineering support in the following areas:

  • Build reusable, testable, and efficient Python-based Playbooks that codify the business drivers of the customer.

  • Extend the SOAR platform through the development of Phantom Apps.

  • Train and mentor security teams expertise and knowledge on the best use of Phantom and automation.

  • Identify use cases that can be built with existing tools and Phantom to enable automation and orchestration.

  • This role also includes supporting the definition of requirements that enable innovative integrations and playbooks.

  • Collaborate on the evaluation and test solutions with the intent of improving Splunk's overall risk posture.

Requirements:

  • Proficient development skills with Python, with experience in using REST APIs to integrate disparate security technologies.

  • An understanding of software development standard methodologies to identify requirements and guide other SOAR engineers to develop new apps and playbooks.

  • A strong foundation in the deployment of a wide range of security solutions. Experience in Linux and networking is required.

  • You possess the ability to accurately assess problems and requests from multiple perspectives, analyze approach feasibility, and decide on the efficient course of action.

  • 7 or more years of security experience in one or more of these critical areas: Information Security Technology, Engineering, Operations, Technology Infrastructure and Proof of Concept - testing labs.

  • Communicate data, facts, and analysis regarding operational delivery.

  • You will support collaboration when working on engineering's goals and objectives.

  • You are eligible to work in the United States without company sponsorship

Nice to Haves:

  • Experience with Splunk Enterprise, Splunk Phantom SOAR, Git and/or Ansible

  • Multiple relevant security certifications (CISSP, CISM, etc.)

  • Understand GDPR, PCI and FedRAMP regulations and the protections afforded customers and employees

We value diversity at our company. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or any other applicable legally protected characteristics in the location in which the candidate is applying.

For job positions in San Francisco, CA, and other locations where required, we will consider for employment qualified applicants with arrest and conviction records.

icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Senior Dfir Analyst (US Remote Available)

Splunk

Posted 1 week ago

VIEW JOBS 6/24/2020 12:00:00 AM 2020-09-22T00:00 Join us as we pursue our disruptive new vision to make machine data accessible, usable and valuable to everyone. We are a company filled with people who are passionate about our product and seek to deliver the best experience for our customers. At Splunk, we're committed to our work, customers, having fun and most importantly to each other's success. Learn more about Splunk careers and how you can become a part of our journey! Role: The Splunk Senior DFIR Analyst reports to the Sr. Manager of Digital Forensics and Incident Response (SplunkCIRT). The role is based in San Jose or Tyson's Corner, VA. This role will be responsible for delivering three core team responsibilities: incident response, digital forensics, and threat hunting. The nature of the work may include after hours and on-call support. You are passionate about DFIR, have a desire to always learn and improve, as well as mentor others. Previous experience in one of the following areas is required: digital forensics, threat hunting, and enterprise incident response. Critical thinking and great communication skills are necessary for this role, as you will be need to convey highly technical concepts and advise decision makers on the best course of action. We are a passionate team who has fun, enjoys a good laugh but above all else thinks security first. Responsibilities: * Build strong relationships with business owners and service providers from across Splunk * Triage, call out, and contain computer security incidents from across multiple Splunk environments, including segmented public cloud environments * Develop and test incident response playbooks * Provide digital forensics services including acquisition, analysis, and reporting for Linux, OSX, and Windows endpoints * Conduct log analysis across a diverse ecosystem of technology to locate root cause of incidents * Creation and execution of planned and ad-hoc threat hunting missions, which may transition into new detections * Research and keep up to date on threat actors and new TTPs * Write detailed incident reports and deliver presentations to key business partners * Participate in after action reviews and contribute to improvements in the overall security posture of Splunk Requirements: * 5+ years professional IT or IT Security experience; or 3 years and a Master's degree * 2 years or more of experience as a full time incident responder or forensic analyst * Knowledge of network security monitoring capabilities including Suricata/Snort signatures, session analysis, and full packet collection * Knowledge of detecting threat actors across the entire cyber kill chain * Working knowledge of conducting forensic investigations * Ability to perform basic static and dynamic malware analysis * Working knowledge of Cloud technologies * Ability to multitask, prioritize and take-charge * Demonstrated history of solving problems with no obvious solutions * Good interpersonal skills and ability to see things through the customer's eyes * Solid attention to detail * Bachelor's Degree in Computer Science, Information Security or related discipline or equivalent work experience * Eligible to work in the United States without company sponsorship We value diversity at our company. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or any other applicable legally protected characteristics in the location in which the candidate is applying. For job positions in San Francisco, CA, and other locations where required, we will consider for employment qualified applicants with arrest and conviction records. Splunk San Jose CA

Senior Security Automation Engineer (US Remote Available)

Splunk