Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Threat Intelligence Analyst (US Remote Available) - 30603 image - Rise Careers
Job details

Threat Intelligence Analyst (US Remote Available) - 30603

Splunk is here to build a safer and more resilient digital world. The world's leading enterprises use our unified security and observability platform to keep their digital systems secure and reliable. While customers love our technology, it's our people that make Splunk stand out as an amazing career destination and why we've won so many awards as a best place to work. If you become a Splunker, we want your whole, authentic self, what we call your "million data points". So bring your work experience, problem-solving skills and talent, of course, but also bring your joy, your passion and all the things that make you, you.Role SummaryThis role will support the threat intelligence mission, which includes understanding the sophisticated threats that Splunk may be exposed to and contributing to the collection, analysis, and dissemination of intelligence to support internal customers. The nature of the work may occasionally include after hours support during major incidents. You are self-motivated and passionate about tracking threat actors, including a desire to automate and improve ingestion of threat data. We are a hard-working team who has fun, enjoys a good laugh but above all else thinks security first.Meet the TeamThe threat Intelligence Analyst works for the Senior Manager, Threat Hunting and Intelligence, with mentorship from one of our Principal Analysts in our fast-growing Global Security Operations organization. As a member of the Threat Hunting and Intelligence team, you will work with our multi-functional peer teams such as Threat Hunt, Detection Engineering, SOC, Advanced Response and others to ensure that Splunk is always prepared for emergent threats.What you'll get to do• Contribute to tactical through strategic level threat intelligence products, both cadenced and ad-hoc, for Splunk including evaluating and updating indicators, TTPs, behavioral patterns, and threat actor profiles• Craft responses to RFIs from internal customers that provides decision advantage• Assist efforts to integrate threat data into SIEM solution• Support the development of threat landscape reportingMust-have Qualifications• 5 years or more of professional Information Security or Intelligence experience; or 3 years as a full-time cyber threat intelligence analyst• Experience with open source and threat intelligence specific vendor tooling• Knowledge of threat actor profiles and campaigns• Demonstrable understanding of structured analytical techniques including, but not limited to Quality of Information Check, Analysis of Competing Hypotheses, Key Assumptions Check, Signposts and Indicators, and Gap Analysis• Detailed understanding of the MITRE ATT&CK Framework, the Diamond Model of Intrusion Analysis and/or the Cyber Kill Chain• Solid grasp of Cloud technologies with a robust understanding of Windows, Linux and MacOS• Strong critical thinking and the ability to recognize and avoid biases in analysis are vital for this role as you will need to advise decision-makers on the best course of action based on often incomplete and subjective information. Ability to produce clear, concise, and timely reporting with a proven attention to detailNice-to-have QualificationsWe’ve taken special care to separate the must-have qualifications from the nice-to-haves. “Nice-to-have” means just that: Nice. To. Have. So, don’t worry if you can’t check off every box. We’re not hiring a list of bullet points–we’re interested in the whole you.• Experience performing searching and reporting with Splunk• Experience with Purple Teaming• Ability to reduce large datasets into meaningful information• Loves sharing information via presentations and prose for a variety of technical and non-technical audiencesSplunk is an Equal Opportunity EmployerAt Splunk, we believe creating a culture of belonging isn’t just the right thing to do; it’s also the smart thing. We prioritize diversity, equity, inclusion, and belonging to ensure our employees are supported to bring their best, most authentic selves to work where they can thrive. Qualified applicants receive consideration for employment without regard to race, religion, color, national origin, ancestry, sex, gender, gender identity, gender expression, sexual orientation, marital status, age, physical or mental disability or medical condition, genetic information, veteran status, or any other consideration made unlawful by federal, state, or local laws. We consider qualified applicants with criminal histories, consistent with legal requirements.Note:Base Pay RangeSF Bay Area, Seattle Metro, and New York City Metro AreaBase Pay Range: $133,600.00 - 183,700.00 per yearCalifornia (excludes SF Bay Area), Washington (excludes Seattle Metro), Washington DC Metro, and MassachusettsBase Pay Range: $120,240.00 - 165,330.00 per yearAll other cities and states excluding California, Washington, Massachusetts, New York City Metro Area and Washington DC Metro Area.Base Pay Range: $106,880.00 - 146,960.00 per yearSplunk provides flexibility and choice in the working arrangement for most roles, including remote and/or in-office roles. We have a market-based pay structure which varies by location. Please note that the base pay range is a guideline and for candidates who receive an offer, the base pay will vary based on factors such as work location as set out above, as well as the knowledge, skills and experience of the candidate. In addition to base pay, this role is eligible for incentive compensation and may be eligible for equity or long-term cash awards.Benefits are an important part of Splunk's Total Rewards package. This role is eligible for a competitive benefits package which includes medical, dental, vision, a 401(k) plan and match, paid time off and much more! Learn more about our comprehensive benefits and wellbeing offering at https://splunkbenefits.com.
Splunk Glassdoor Company Review
3.9 Glassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon Glassdoor star icon
Splunk DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of Splunk
Splunk CEO photo
Gary Steele
Approve of CEO

Average salary estimate

Estimate provided by employer
$9676 / MONTHLY (est.)
min
max
$8130K
$11221K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

Similar Jobs
Photo of the Rise User
Posted 19 hours ago
Customer-Centric
Mission Driven
Dare to be Different
Diversity of Opinions
Friends Outside of Work
Startup Mindset
Emails over Meetings
Transparent & Candid
Growth & Learning
Medical Insurance
Learning & Development
Paid Holidays
Paid Sick Days
Photo of the Rise User
Experian Remote Centro Corporativo el Cafetal, Heredia, Heredia, Costa Rica
Posted 6 days ago
Photo of the Rise User
Scale AI Hybrid San Francisco, CA; New York, NY
Posted 5 days ago
The Internet of Behaviors Company Remote Remote, Greater Pretoria Region, South Africa
Posted 7 days ago
Photo of the Rise User
Bertoni Solutions Remote Híbrido/Remoto, Santa Fe, Ciudad de México, Mexico
Posted 7 days ago
Monad Foundation Remote No location specified
Posted 7 days ago

Splunk’s purpose is to build a safer and more resilient digital world.

101 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, remote
DATE POSTED
August 28, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
Photo of the Rise User
Someone from OH, Stow just viewed IT Asset administrator at Ergomed
Photo of the Rise User
Someone from OH, Loveland just viewed Senior Buyer (wholesale) (m/f/d) at ABOUT YOU SE & Co. KG
Photo of the Rise User
Someone from OH, Cincinnati just viewed Summer 2025 Internship: Talent at Hylant
C
Someone from OH, Cincinnati just viewed Senior Instructional Designer at CXG
Photo of the Rise User
Someone from OH, Youngstown just viewed Compliance Specialist, Anti-Corruption Program at ServiceNow
Photo of the Rise User
Someone from OH, Cleveland just viewed Finance Intern - Summer 2025 at Spectrum
Photo of the Rise User
Someone from OH, Cleveland just viewed QC Engineer at QODE
Photo of the Rise User
34 people applied to Cyber Crime Analyst at TEKsystems
Photo of the Rise User
Someone from OH, Cleveland just viewed Getinge is hiring: UI/UX Developer in Streetsboro at Getinge
Photo of the Rise User
Someone from OH, Westerville just viewed Data analyst | Mid at Nord Security
Photo of the Rise User
7 people applied to SOC Analyst at Prosegur
Photo of the Rise User
Someone from OH, North Canton just viewed Researcher-NBC Sports at NBCUniversal
Photo of the Rise User
Someone from OH, North Canton just viewed Researcher-NBC Sports at NBCUniversal
Photo of the Rise User
Someone from OH, Lakewood just viewed Culture and Programs Analyst at City of Philadelphia
Photo of the Rise User
Someone from OH, Olmsted Falls just viewed Customer Service - Representative at Waterway Carwash
M
Someone from OH, Strongsville just viewed Technical Writer (Contract) at Mintlify
Photo of the Rise User
Someone from OH, Cincinnati just viewed Inside Sales Co-Op at VEGA Americas
S
Someone from OH, Cleveland just viewed Senior JavaScript Developer at SuperDial
Photo of the Rise User
Someone from OH, Columbus just viewed Environmental Science Intern at Kimley-Horn
Photo of the Rise User
Someone from OH, Dayton just viewed Sr Renewal Analyst 1730 at MeridianLink