![](https://dn9tckvz2rpxv.cloudfront.net/enableamerica.jobs/img/logo.jpg)
Job Information
Splunk Information Security Analyst (Costa Rica) in San Jose, Costa Rica
Splunk is here to build a safer and more resilient digital world. The world's leading enterprises use our unified security and observability platform to keep their digital systems secure and reliable. While customers love our technology, it's our people that make Splunk stand out as an amazing career destination and why we've won so many awards as a best place to work. If you become a Splunker, we want your whole, authentic self, what we call your "million data points". So bring your work experience, problem-solving skills and talent, of course, but also bring your joy, your passion and all the things that make you, you.
Role Summary
Do you want to make a difference in the security posture of an entire company? This role will be responsible for developing, fixing, and debugging internal deployments of Splunk products, such as Splunk Cloud Platform and SOAR. You will have a deep understanding of Information Security and software development principles coupled with a strong desire to learn and grow within the organization. This role will be part of the Splunk Security Center of Excellence team and will engage in problem solving, effectively elevating the internal customer experience, automating processes, and improving the reliability of our services. We are a passionate team who has fun, enjoys a good laugh but above all else thinks security first!
What you'll get to do
Work closely with the Splunk Global Security (SGS) teams to improve existing automation and search initiatives that deliver resilient solutions
Tap into your expertise of all things Splunk to address sophisticated issues
Build and improve custom data onboarding scripts and add-ons for internal corporate tools and services
Analyze internal metrics and workflows to reduce false positives and accurately focus engineering efforts
Develop repeatable processes to build playbooks in order to efficiently resolve any incidents that arise
Serve as initial support for internal customers and maintain high availability of playbooks.
Implement validated security strategies related to our team’s Linux-based and AWS-based infrastructure, Python code, and containerized services
Must-have Qualifications
Bachelor's degree with 5+ years of proven experience in Cybersecurity technologies with focus on one or more of the following areas such as SIEM, vulnerability management, firewalls, forensics, data logging, and IAM
2+ years of demonstrable experience in tool integrations, CI/CD and REST APIs as well as software development experience with Python, Golang, JavaScript, or similar
Fully proficient in git and version control systems, like GitLab and GitHub
Experience in Security Operations, SIEM, Incident Response, and Threat Intelligence
Skilled in Linux administration and Cloud Technologies, such as AWS
Excellent communication skills, both verbal and written; able to explain intricate technical topics to varying groups
Nice-to-have Qualifications
We’ve taken special care to separate the must-have qualifications from the nice-to-haves. “Nice-to-have” means just that: Nice. To. Have. So, don’t worry if you can’t check off every box. We’re not hiring a list of bullet points–we’re interested in the whole you.
- Splunk Certification in Architecture/Administration is desirable.
Splunk is an Equal Opportunity Employer
At Splunk, we believe creating a culture of belonging isn’t just the right thing to do; it’s also the smart thing. We prioritize diversity, equity, inclusion, and belonging to ensure our employees are supported to bring their best, most authentic selves to work where they can thrive. Qualified applicants receive consideration for employment without regard to race, religion, color, national origin, ancestry, sex, gender, gender identity, gender expression, sexual orientation, marital status, age, physical or mental disability or medical condition, genetic information, veteran status, or any other consideration made unlawful by federal, state, or local laws. We consider qualified applicants with criminal histories, consistent with legal requirements.
Note: Splunk provides flexibility and choice in the working arrangement for most roles, including remote and/or in-office roles. We have a market-based pay structure which varies by location. Please note that the base pay range is a guideline and for candidates who receive an offer, the base pay will vary based on factors such as work location as set out below, as well as the knowledge, skills and experience of the candidate. In addition to base pay, this role is eligible for incentive compensation and may be eligible for equity or long-term cash awards.
Benefits are an important part of Splunk's Total Rewards package. This role is eligible for a comprehensive, competitive benefits package which may include healthcare and retirement plans, paid time off, wellbeing expense reimbursement, and much more! Learn more about our comprehensive benefits and wellbeing offering here (https://splunkbenefits.com/int) .
Base Pay Range
Costa Rica
Base Pay: CRC 24,000,000.00 - 33,000,000.00 per year
Splunk
-
- Splunk Jobs