Enable job alerts via email!

Splunk Threat Content Developer – Cloud API Threat Detection (BHJOB22048_760)

ITmPowered

Denver (CO)

Remote

USD 90,000 - 150,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player seeks a Splunk Threat Content Developer to spearhead innovative solutions in Cloud and API Security. This role involves developing and implementing cutting-edge threat detection content, ensuring robust security measures against emerging threats. Ideal candidates will have a strong background in Splunk content development, API Security, and Cloud Security, along with programming skills in languages like Python and Java. Join a dynamic team that values collaboration and innovation, and make a significant impact in the cybersecurity landscape while working remotely from anywhere in the U.S.

Qualifications

  • Strong experience in Splunk content development and dashboard building.
  • Familiarity with Cloud Security and API Security best practices.

Responsibilities

  • Lead Splunk content development for Cloud and API Security threat detection.
  • Engineer Splunk content to monitor API traffic and remediate threats.

Skills

Splunk Content Development
API Security
Cloud Security
Python
Java
C++
Perl
HTML
CSS
Ansible

Education

Security Certifications (GIAC/SANS, ISC (2), EC-Council)

Tools

Splunk
SIEM Solutions
Windows Tools
Linux Tools

Job description

Splunk Threat Content Developer – Cloud and API Threat Detection – Remote

The Splunk Threat Content Developer will develop, implement, and oversee content development for Threat Detection, Threat Analysis, and Threat investigations focused on Cloud Security and API Security. Bring your Splunk Content Engineering in Threat Detection, Threat analysis, Threat investigation, Splunk Security Analytics, for Cloud (Azure, AWS, SaaS, IaaS, PaaS) as well as API Security / OWASP threats.

Responsibilities:

  • Lead Splunk content development focused on Threat (detection, analytics, investigation, and response) for Cloud Security (SaaS / IaaS / PaaS) and API Security (OWASP) threat use cases.
  • Focus on: Cloud and API Threat Detection engineering, Content engineering, Splunk Enterprise Security, Cloud and API Security Threat content (OWASP, API Security, Cloud Security, and Healthcare security).
  • Develop and implement Custom Splunk content and dashboards for analysts on emerging Cloud/API threats.
  • Provide threat visibility and awareness for Cyber Security organization for new security capabilities.
  • Engineer Splunk content for Cloud /API Security Threat Detection, alerting, dashboards, IR runbooks, automation.
  • Develop Splunk Content for Cloud / API Security threat use cases (cloud, container, or orchestration misconfiguration, OWASP vulnerabilities, Injection Flaws, insecure network policies, logging & monitoring / runtime threats, CI/CD pipeline & supply chain flaws, cloud IAM roles, Account hijacking, Data exfiltration).
  • Cloud Identity Management, privileged access escalation, Key Management threat scenarios.
  • Engineer Splunk content to monitor continuously for anomalous API traffic, remediating threats in near real time.
  • Engineer Splunk content for API Security Threat use cases (Broken authentication / access controls, security misconfigurations, automated threats, unsafe API consumption, Injection, request forgery, etc.).
  • Engineer cloud threat Splunk correlation searches which provide the alerting mechanisms used by the SOC.
  • Review newly ingested data sources for potential security alerts and create dashboards.

Qualifications, skills, and experience:

  • Splunk experience and certifications.
  • Strong experience in Splunk content development, building dashboards, reports and lookup tables.
  • Experience with API Security, Cloud Security, and OWASP.
  • Familiarity with Cloud Security (Azure) and/or Cloud Security Posture Management (CSPM).
  • Programming experience (Splunk SPL, Python, Java, C++, Perl, HTML, CSS, Ansible, other).
  • Expertise in large scale cyber security data analytics, identifying data-driven threat collection opportunities.
  • Implementation, Operation and/or Management of SIEM solutions.
  • Experience with common enterprise IT tools and logs (AD/AAD, IAM/MFA, CSPM, etc.).
  • Experience with Windows and Linux tools.
  • Security certifications (GIAC/SANS, ISC (2), EC-Council, etc.).
  • Experience with automating common repeatable tasks using a variety of tools and methods.
  • Information security analysis experience in a Cyber Security Operations Center (CSOC).

Soft skills:

  • Ability to collaborate with others, leveraging many project approaches (Agile/Scrum, Waterfall, Gantt Charts).
  • Comfortable working remotely with team members around the country. Self-starter with intellectual curiosity.
  • Development of technical documents or presentations – IR/SOC threat runbooks.

LOGISTICS:

  • Work remotely anywhere in Domestic US. Preferred locations Colorado or Georgia.
  • COVID-19 Vaccine and Booster Required – OR must provide valid medical exemption from doctor in advance.
  • Must be able to successfully pass a 12-panel drug screen, 10-year background check, employment verification.
  • You will need to be a current US Citizen or valid Green Card holder. No need for visa now or in future. This role is not able to offer visa transfer or sponsorship now or in the future.
  • W2 only – No sub vendors. Sponsorship NOT available.
  • Must have direct contact information on resume (phone/email) to be considered.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Splunk Threat Content Developer – Cloud API Threat Detection (BHJOB22048_760)

ITmPowered

Seattle

Remote

USD 100,000 - 125,000

30+ days ago

Splunk Threat Content Developer – Cloud API Threat Detection (BHJOB22048_760)

ITmPowered

Atlanta

Remote

USD 80,000 - 120,000

30+ days ago