Match score not available

Security Threat Researcher

extra holidays - extra parental leave - fully flexible
Remote: 
Full Remote
Salary: 
117 - 201K yearly
Experience: 
Mid-level (2-5 years)
Work from: 

Offer summary

Qualifications:

Minimum 2 years of experience in security analysis., Bachelor’s degree in Computer Science or related field., Deep understanding of phishing techniques and threats., Proficiency in writing detections using various technologies..

Key responsabilities:

  • Develop detections for phishing scenarios.
  • Review potential phishing websites and adjust detections.
  • Collaborate with developers on detection improvements.
  • Investigate customer-reported detection issues.
Splunk logo
Splunk Information Technology & Services Large http://www.splunk.com
5001 - 10000 Employees
See more Splunk offers

Job description

Description

Join us as we pursue our ground-breaking new vision to make machine data accessible, usable and valuable to everyone. We are a company filled with people who are passionate about our product and seek to deliver the best experience for our customers. At Splunk, we’re committed to our work, customers, having fun and most meaningfully to each other’s success. Learn more about Splunk careers and how you can become a part of our journey!
Role Summary:
Join our team, formerly known as TwinWave, in developing phishing detections for our cutting-edge, microservice-based threat analysis pipeline. This role involves creating new phishing detection logic and technologies, utilizing our existing analysis engines and detection languages.

 

Team Dynamics:
Our team is made up of a diverse mix of talents, including developers, analysts, researchers, and hybrid roles. You will work closely with principal threat researchers specializing in phishing detection. If you take pride in thwarting phishing attempts, this role in our dedicated team of detection engineers is ideal for you.

 

Key Responsibilities:

 

  • Stay informed about the current phishing landscape and develop effective detections to protect our customers.
  • Review a large number of potential phishing websites daily to determine if new detections need to be created, or existing detections need tuning
  • Collaborate with developers to identify and resolve issues, missing features, and enhance phishing-related detection capabilities.
  • Investigate and respond to detection related issues reported by customers.
Qualifications:

 

  • Minimum 2 years of experience as a detection engineer, security researcher, or threat analyst.
  • Bachelor’s degree in Computer Science or a related quantitative field (equivalent education/experience considered).
  • Deep understanding of the modern phishing landscape, including threat actors, phishing kits, AITM/Reverse Proxy frameworks, and related techniques.
  • Proficiency in writing phishing detections using various technologies (e.g., Regex,, ClamAV, Suricata).

 

Required Skills:

 

  • Expertise in creating complex regular expressions for detection.
  • Familiarity with typical phishing kit structures.
  • In-depth knowledge of HTML, Javascript, and the HTTP protocol.
  • Proficiency in JSON.
  • Excellent verbal and written communication skills.

 

Preferred Skills:

 

  • Knowledge of common network protocols (FTP, SMTP).
  • Proficiency in Python or Go
  • Familiarity with the MITRE ATT&CK Framework and other relevant attacker tactics, techniques, and procedures (TTPs).

Splunk is an Equal Opportunity Employer: At Splunk, we believe creating a culture of belonging isn’t just the right thing to do; it’s also the smart thing. We prioritize diversity, equity, inclusion, and belonging to ensure our employees are supported to bring their best, most authentic selves to work where they can thrive. Qualified applicants receive consideration for employment without regard to race, religion, color, national origin, ancestry, sex, gender, gender identity, gender expression, sexual orientation, marital status, age, physical or mental disability or medical condition, genetic information, veteran status, or any other consideration made unlawful by federal, state, or lo

Note:

Base Pay Range

SF Bay Area, Seattle Metro, and New York City Metro Area

Base Pay Range: $146,400.00 - 201,300.00 per year

California (excludes SF Bay Area), Washington (excludes Seattle Metro), Washington DC Metro, and Massachusetts

Base Pay Range: $131,760.00 - 181,170.00 per year

All other cities and states excluding California, Washington, Massachusetts, New York City Metro Area and Washington DC Metro Area.

Base Pay Range: $117,120.00 - 161,040.00 per year

Splunk provides flexibility and choice in the working arrangement for most roles, including remote and/or in-office roles. We have a market-based pay structure which varies by location. Please note that the base pay range is a guideline and for candidates who receive an offer, the base pay will vary based on factors such as work location as set out above, as well as the knowledge, skills and experience of the candidate. In addition to base pay, this role is eligible for incentive compensation and may be eligible for equity or long-term cash awards.

Benefits are an important part of Splunk's Total Rewards package. This role is eligible for a competitive benefits package which includes medical, dental, vision, a 401(k) plan and match, paid time off and much more! Learn more about our next-level benefits at https://splunkbenefits.com.

Thank you for your interest in Splunk!

Required profile

Experience

Level of experience: Mid-level (2-5 years)
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Communication

Researcher Related jobs