Splunk
Offensive Security Engineer
Splunk, San Jose, CA
DescriptionSplunk, a Cisco company, is building a safer and more resilient digital world with an end-to-end full stack platform made for a hybrid, multi-cloud world. Leading enterprises use our unified security and observability platform to keep their digital systems secure and reliable. Our customers love our technology, but it's our caring employees that make Splunk stand out as an amazing career destination. No matter where in the world or what level of the organization, we approach our work with kindness. So bring your work experience, problem-solving skills and talent, of course, but also bring your joy, your passion and all the things that make you, you. Come help organizations be their best, while you reach new heights with a team that has your back.Role SummaryWe are looking for a smart, passionate, and experienced Penetration Tester with a broad range of experience working in dynamic enterprise environments. Do you want to utilize your hard-won offensive security experience to drive security posture improvements across our organization? As a Penetration Tester, you will do that and more!The Penetration Tester reports to the Sr. Manager of Penetration Testing. This role will be responsible for performing penetration testing, red team assessments, and adversary emulation. The ideal candidate will have previous experience in the following areas: network, web application, and cloud-centric penetration testing. Ability to influence change across functions and apply critical thinking skills are key success factors. Exceptional technical, communication and negotiation skills are necessary for this role, as you will need to provide technical guidance to junior pen testers, perform advanced technical assessments, translate highly technical concepts into business impact and make remediation recommendations.What you'll get to doPrioritize, lead, and perform advanced penetration testing for network, web applications, business application, and cloud infrastructure.Guide the team in the development of technical frameworks, tools and execution of pen testsConduct red team assessments and adversary emulation engagementsCoordinate and execute “Purple teaming” exercises in collaboration with the Security Operations teamCollaborate with 3rd parties including consulting firms and security researchers on coordinating assessments, validating vulnerability reports/findings and influencing remediationBuild processes to coordinate pentests and establish remediation cadence cross-functionsBe a standout colleague who enjoys collaborating with, learning from, mentoring, and teaching other team members to create a positive work environmentFoster a collaborative environment across a remote teamMust-have QualificationsAt least 5 years experience in an IT or security function, with at least 3 years of hands-on experience in a penetration testing roleExperience with Python, PowerShell, or similar scripting languageExperience using industry standard offensive security toolsYou have proven experience pen testing in web applications, network, wifi and cloud computing solution (AWS, GCP, Kubernetes)You have a proficiency with enterprise operating systems, including Linux and WindowsYou have practical experience with assessing encryption, IAM systems, VPN and authentication technologiesYou have extensive knowledge of TCP/IP networking and packet analysisYou pride yourself on your proven attention to detailExcellent, efficient problem-solving skillsStrong familiarity with at least one of the following: OWASP Top 10, PTES, or NSA Vulnerability and Penetration Testing StandardsExperience facilitating penetration testing efforts in one or more of the following Compliance frameworks (FedRAMP, PCI, SOCII, HIPAA)Nice-to-have QualificationsWe’ve taken special care to separate the must-have qualifications from the nice-to-haves. “Nice-to-have” means just that: Nice. To. Have. So, don’t worry if you can’t check off every box. We’re not hiring a list of bullet points–we’re interested in the whole you.You have professional-level certifications (OSCP, GPEN, GWAPT, GXPN)Experience with higher-level programming languages (C, C++, etc.)Experience with API penetration testingExperience with containerization offensive techniquesExploit development, vulnerability research, bug bounty submissionsSplunk is an Equal Opportunity EmployerAt Splunk, we believe creating a culture of belonging isn’t just the right thing to do; it’s also the smart thing. We prioritize diversity, equity, inclusion, and belonging to ensure our employees are supported to bring their best, most authentic selves to work where they can thrive. Qualified applicants receive consideration for employment without regard to race, religion, color, national origin, ancestry, sex, gender, gender identity, gender expression, sexual orientation, marital status, age, physical or mental disability or medical condition, genetic information, veteran status, or any other consideration made unlawful by federal, state, or local laws. We consider qualified applicants with criminal histories, consistent with legal requirements.Note:Base Pay RangeCosta RicaBase Pay: CRC 24,000,000.00 - 33,000,000.00 per yearSplunk provides flexibility and choice in the working arrangement for most roles, including remote and/or in-office roles. We have a market-based pay structure which varies by location. Please note that the base pay range is a guideline and for candidates who receive an offer, the base pay will vary based on factors such as work location as set out above, as well as the knowledge, skills and experience of the candidate. In addition to base pay, this role is eligible for incentive compensation and may be eligible for equity or long-term cash awards.Benefits are an important part of Splunk's Total Rewards package. This role is eligible for a comprehensive, competitive benefits package which may include healthcare and retirement plans, paid time off, wellbeing expense reimbursement, and much more! Learn more about our next-level benefits at .Thank you for your interest in Splunk!