Cybersecurity Incident Response Analyst
Splunk
Remote
•8 hours ago
•No application
About
Role:
Responsibilities:
- Support the 24x7 SOC operation: respond to security alerts, contain threats, and ensure the safety and security of Splunk's product environments
- Contribute to the development and improvement of detection logic, working hand-in-hand with our Detection Engineering function
- Improve the quality of searches to enrich data through creation of automation and orchestration playbooks
- Perform reactive and novel threat hunting engagements across Splunk environments to surface sophisticated attacks and threats
- Collect and represent evidence to support the organization's compliance and control monitoring responsibilities
- Author, review, and update existing runbooks to ensure optimal and efficient response actions
- Partner with Splunk's Center of Excellence to validate existing data sources and improve data ingestion standards, ensuring data quality
- Collaborate with product development teams to support testing, feedback, and idea generation for Splunk products
- Serve as a trusted resource to your fellow analysts, providing guidance, mentorship, and support in day-to-day operations and projects to elevate overall team performance
Requirements:
- 5+ years of related experience; or Masters degree with 3 years of related experience
- Bachelor's degree in computer science or related field or equivalent relevant experience
- Robust experience with information security technologies, including firewalls, intrusion detection systems, and endpoint security tools; solid understanding of cloud and container security tools and practices is a plus
- Solid grasp of TCP/IP protocols, DNS, network analysis, and the OSI framework
- Experience with cloud platforms and technologies
- Ability to multitask, prioritize, and lead response operations and team initiatives
- Ability to think outside of the box for creative solutions to problems with the moxie to follow-through
- Excellent interpersonal skills and ability to see situations through a Customer First lens; ability to translate sophisticated technical concepts into clear, accessible language
- Meticulous attention to detail; consistently meets high standards of quality
Splunk is an Equal Opportunity Employer
Note:
Base Pay Range
SF Bay Area, Seattle Metro, and New York City Metro Area
Base Pay Range: $133,600.00 - 183,700.00 per year
California (excludes SF Bay Area), Washington (excludes Seattle Metro), Washington DC Metro, and Massachusetts
Base Pay Range: $120,240.00 - 165,330.00 per year
All other cities and states excluding California, Washington, Massachusetts, New York City Metro Area and Washington DC Metro Area.
Base Pay Range: $106,880.00 - 146,960.00 per year
Splunk provides flexibility and choice in the working arrangement for most roles, including remote and/or in-office roles. We have a market-based pay structure which varies by location. Please note that the base pay range is a guideline and for candidates who receive an offer, the base pay will vary based on factors such as work location as set out above, as well as the knowledge, skills and experience of the candidate. In addition to base pay, this role is eligible for incentive compensation and may be eligible for equity or long-term cash awards.
Benefits are an important part of Splunk's Total Rewards package. This role is eligible for a competitive benefits package which includes medical, dental, vision, a 401(k) plan and match, paid time off and much more! Learn more about our next-level benefits at https://splunkbenefits.com.