Назад
Company hidden
7 дней назад

Principal Splunk-Threat Detection & Integration Engineer (Cybersecurity)

Формат работы
remote (только USA)
Тип работы
fulltime
Грейд
senior
Английский
b2
Страна
US
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Principal Splunk-Threat Detection & Integration Engineer (Cybersecurity): Own the detection content lifecycle in Splunk Enterprise Security with an accent on complex correlation searches, Risk-Based Alerting logic, and custom integrations across security stack. Focus on architecting RBA programs, building cross-domain detections mapped to MITRE ATT&CK, and operationalizing threat intelligence frameworks.

Location: Remote (USA - Must Work EST 8:30AM-5:30PM, U.S. Citizen required)

Company

Cybersecurity firm focused on Splunk Enterprise Security solutions for threat detection and response.

What you will do

  • Own detection content lifecycle: design, SPL prototyping, validation, peer review, deployment, tuning, and decommissioning.
  • Architect Risk-Based Alerting program including risk signals, notables, scoring, modifiers, and throttling strategies.
  • Write and optimize complex SPL using accelerated data models, lookups, KV-store, and REST introspection.
  • Engineer Splunk CIM normalization, Asset & Identity framework, and Threat Intelligence operationalization with IOC feeds and CVE integration.
  • Develop custom integrations and automation via REST APIs, HEC, Python connectors, and SOAR playbooks.
  • Build cross-domain detections across identity, endpoint, network, cloud, and more; onboard log sources; manage license capacity; create SOC dashboards.

Requirements

  • 8+ years in security engineering/SOC/IR/detection content, 5+ years Splunk ES in production
  • Mastery of SPL, performance search design, multi-value handling, lookups, KV-store, REST API.
  • Full Splunk ES experience: correlation searches, findings, Risk Framework, Asset & Identity, Threat Intelligence.
  • Senior RBA practice: risk rules, scoring calibration across domains, aggregate strategies.
  • Splunk CIM fluency, custom mappings, base searches; hands-on detection across all security domains with MITRE mapping.
  • Log onboarding, custom integrations/automation (REST/HEC/Python/SOAR), threat intel operationalization; Splunk certification required.

Culture & Benefits

  • Senior individual-contributor role driving programs and mentoring juniors.
  • Operate against tight deadlines across concurrent workstreams as technical authority and escalation point.
  • Peer review and documentation standards for every detection.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →