What are the responsibilities and job description for the Security Threat Researcher position at Splunk?
Join us as we pursue our ground-breaking new vision to make machine data accessible, usable and valuable to everyone. We are a company filled with people who are passionate about our product and seek to deliver the best experience for our customers. At Splunk, we’re committed to our work, customers, having fun and most meaningfully to each other’s success. Learn more about Splunk careers and how you can become a part of our journey!
Role Summary
Join our team, formerly known as TwinWave, in developing phishing detections for our cutting-edge, microservice-based threat analysis pipeline. This role involves creating new phishing detection logic and technologies, utilizing our existing analysis engines and detection languages.
Team Dynamics
Our team is made up of a diverse mix of talents, including developers, analysts, researchers, and hybrid roles. You will work closely with principal threat researchers specializing in phishing detection. If you take pride in thwarting phishing attempts, this role in our dedicated team of detection engineers is ideal for you.
Key Responsibilities
Note
Base Pay Range
SF Bay Area, Seattle Metro, and New York City Metro Area
Base Pay Range $146,400.00 - 201,300.00 per year
California (excludes SF Bay Area), Washington (excludes Seattle Metro), Washington DC Metro, and Massachusetts
Base Pay Range $131,760.00 - 181,170.00 per year
All other cities and states excluding California, Washington, Massachusetts, New York City Metro Area and Washington DC Metro Area.
Base Pay Range $117,120.00 - 161,040.00 per year
Splunk provides flexibility and choice in the working arrangement for most roles, including remote and/or in-office roles. We have a market-based pay structure which varies by location. Please note that the base pay range is a guideline and for candidates who receive an offer, the base pay will vary based on factors such as work location as set out above, as well as the knowledge, skills and experience of the candidate. In addition to base pay, this role is eligible for incentive compensation and may be eligible for equity or long-term cash awards.
Benefits are an important part of Splunk's Total Rewards package. This role is eligible for a competitive benefits package which includes medical, dental, vision, a 401(k) plan and match, paid time off and much more! Learn more about our next-level benefits at https //splunkbenefits.com.
Role Summary
Join our team, formerly known as TwinWave, in developing phishing detections for our cutting-edge, microservice-based threat analysis pipeline. This role involves creating new phishing detection logic and technologies, utilizing our existing analysis engines and detection languages.
Team Dynamics
Our team is made up of a diverse mix of talents, including developers, analysts, researchers, and hybrid roles. You will work closely with principal threat researchers specializing in phishing detection. If you take pride in thwarting phishing attempts, this role in our dedicated team of detection engineers is ideal for you.
Key Responsibilities
- Stay informed about the current phishing landscape and develop effective detections to protect our customers.
- Review a large number of potential phishing websites daily to determine if new detections need to be created, or existing detections need tuning
- Collaborate with developers to identify and resolve issues, missing features, and enhance phishing-related detection capabilities.
- Investigate and respond to detection related issues reported by customers.
- Minimum 2 years of experience as a detection engineer, security researcher, or threat analyst.
- Bachelor’s degree in Computer Science or a related quantitative field (equivalent education/experience considered).
- Deep understanding of the modern phishing landscape, including threat actors, phishing kits, AITM/Reverse Proxy frameworks, and related techniques.
- Proficiency in writing phishing detections using various technologies (e.g., Regex,, ClamAV, Suricata).
- Expertise in creating complex regular expressions for detection.
- Familiarity with typical phishing kit structures.
- In-depth knowledge of HTML, Javascript, and the HTTP protocol.
- Proficiency in JSON.
- Excellent verbal and written communication skills.
- Knowledge of common network protocols (FTP, SMTP).
- Proficiency in Python or Go
- Familiarity with the MITRE ATT&CK Framework and other relevant attacker tactics, techniques, and procedures (TTPs).
Note
Base Pay Range
SF Bay Area, Seattle Metro, and New York City Metro Area
Base Pay Range $146,400.00 - 201,300.00 per year
California (excludes SF Bay Area), Washington (excludes Seattle Metro), Washington DC Metro, and Massachusetts
Base Pay Range $131,760.00 - 181,170.00 per year
All other cities and states excluding California, Washington, Massachusetts, New York City Metro Area and Washington DC Metro Area.
Base Pay Range $117,120.00 - 161,040.00 per year
Splunk provides flexibility and choice in the working arrangement for most roles, including remote and/or in-office roles. We have a market-based pay structure which varies by location. Please note that the base pay range is a guideline and for candidates who receive an offer, the base pay will vary based on factors such as work location as set out above, as well as the knowledge, skills and experience of the candidate. In addition to base pay, this role is eligible for incentive compensation and may be eligible for equity or long-term cash awards.
Benefits are an important part of Splunk's Total Rewards package. This role is eligible for a competitive benefits package which includes medical, dental, vision, a 401(k) plan and match, paid time off and much more! Learn more about our next-level benefits at https //splunkbenefits.com.
Salary : $117,120 - $201,300