|
At Early Warning, we've powered and protected the U.S. financial system for over thirty years with cutting-edge solutions like Zelle, Paze, and so much more. As a trusted name in payments, we partner with thousands of institutions to increase access to financial services and protect transactions for hundreds of millions of consumers and small businesses. Positions located in Scottsdale, San Francisco, Chicago, or New York follow a hybrid work model to allow for a more collaborative working environment. Candidates responding to this posting must independently possess the eligibility to work in the United States, for any employer, at the date of hire. This position is ineligible for employment Visa sponsorship. Overall Purpose The Sr. Manager, Splunk Engineering is pivotal in managing and advancing the organization's logging infrastructure, emphasizing proficiency in Splunk Enterprise and auxiliary logging systems. This role will work closely with stakeholders to gauge and fulfill needs, integrate data sources, and refine the logging for peak operational efficiency and compliance with security mandates. This position is defined by a blend of leadership and direct technical engagement, with expectations to not only guide but also actively partake in technical undertakings and team coordination. Essential Functions
- Mentors and manages the Splunk Engineering team and provides effective leadership to drive a highly engaged, high-performance team.
- Leads the risk and security organization staff to identify, document, architect and develop process efficiencies.
- Maintains an excellent understanding of standard roles, processes and tools utilized within an information security organization.
- Defines, leads, gathers, writes and formalizes process use-cases, functional, and non-functional requirements.
- Communicates and organizes stakeholders and customers within projects to build sustainable solutions with required capabilities.
- Leads, architects, and designs solutions based on project use cases and requirements.
- Leads both the strategic and tactical management of the Splunk Enterprise, Security & User Behavioral Analytic ecosystems, concentrating on data incorporation, system fine-tuning, capacity planning, security and system updates.
- Develops and manages effective monitoring, alerting, and reporting to uphold service level agreements and ensure visibility into system status, usage and security threats.
- Leads efforts to update platforms and apply patches, addressing vulnerabilities and adhering to supported standards.
- Collaborates with other information security departments to augment threat detection capabilities and bolster incident response actions.
- Leads incident management processes, including troubleshooting, resolving outages, and conducting breach investigations.
- Directly engages with end-users for requirements gathering, troubleshooting, and crafting Splunk queries, alerts, reports, and dashboards, ensuring hands-on involvement in technical tasks.
- Produces, updates, and verifies documentation accuracy and relevance for the logging environment.
- Works alongside auditors and fulfills regulatory standards, employing security tools to aid in compliance initiatives.
- Delivers metrics related to platform performance, capacity, and user management, involving direct analysis and refinement efforts.
- Ensures 24x7 operational readiness and swift incident response through participation in an on-call roster.
- Keeps abreast of the latest technologies, trends, and strategies in the field, applying best practices for logging and monitoring.
- Impacts the CSIRTS team to be able to respond to threats by creating, tuning and testing high fidelity rules for our SIEM platform
- Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of detecting threats
- Supports the company's commitment to risk management and protecting the integrity and confidentiality of systems and data.
- The above job description is a summary of job responsibilities and is not intended to be an all-inclusive list of duties and standards of the position. Incumbents will follow instructions and perform tasks and other duties as assigned by their manager.
Minimum Qualifications
- Education and/or experience typically obtained through completion of a bachelor's degree in computer science, IT, Security, Engineering, or Math.
- Minimum 10 years of Splunk and/or information security technology experience.
- Demonstrated ability to lead, mentor, coach and guide
- Ability to work within a team environment and independently.
- Effective communication skills to speak and write for all technology experience levels.
- Effective interpersonal skills, able to comfortably present to peers, coworkers, and customers.
- Excellent experience in analyzing technical issues and making recommendations for corrective action.
- A propensity for continued development of skills though research and training.
- Expert in analyzing advanced technical issues and solving problems or making recommendations for corrective action.
- In-depth knowledge of SIEM components, data ingestion processes, and querying data.
- Demonstrated capability to steer projects, oversee daily tasks, and directly engage in technical duties.
- Exceptional problem-solving, organizational, and communication skills, with the competency to elucidate technical concepts to non-technical audiences.
- Expert knowledge of network monitoring and network exploitation techniques.
- Expert experience in responding to malicious threats coming from various sources.
- Experience managing technical staff and direct reports.
- Background and drug screen
Preferred Qualifications
- Master's degree in computer science, IT, Security, Engineering or Math.
- Subject matter expert within infrastructure, engineering, operations or application security technology domains. Splunk certifications
- Experience in cloud technologies
- Strong background in scripting (Bash, PERL, Python) and Unix/Linux system management.
- Experience with Splunk ES / UBA and various logging systems (syslog-ng/rsyslog, ELK, Filebeat, Kafka, Cribl, Fluentd, Graylog).
Physical Requirements Working conditions consist of a normal office environment. Work is primarily sedentary and requires extensive use of a computer and involves sitting for periods of approximately four hours. Work may require occasional standing, walking, kneeling, and reaching. Must be able to lift 10 pounds occasionally and/or negligible amount of force frequently. Requires visual acuity and dexterity to view, prepare, and manipulate documents and office equipment including personal computers. Requires the ability to communicate with internal and/or external customers. Employee must be able to perform essential functions and physical requirements of position with or without reasonable accommodation. The base pay scale for this position in: Phoenix, AZ/ Chicago, IL in USD per year is: $160,000 - $200,000. San Francisco, CA in USD per year is: $192,000 - $240,000. Additionally, candidates are eligible for a discretionary incentive plan and benefits.
This pay scale is subject to change and is not necessarily reflective of actual compensation that may be earned, nor a promise of any specific pay for any specific candidate, which is always dependent on legitimate factors considered at the time of job offer. Early Warning Services takes into consideration a variety of factors when determining a competitive salary offer, including, but not limited to, the job scope, market rates and geographic location of a position, candidate's education, experience, training, and specialized skills or certification(s) in relation to the job requirements and compared with internal equity (peers). The business actively supports and reviews wage equity to ensure that pay decisions are not based on gender, race, national origin, or any other protected classes. Some of the Ways We Prioritize Your Health and Happiness
Healthcare Coverage-Competitive medical (PPO/HDHP), dental, and vision plans as well as company contributions to your Health Savings Account (HSA) or pre-tax savings through flexible spending accounts (FSA) for commuting, health & dependent care expenses. 401(k) Retirement Plan-Featuring a 100% Company Safe Harbor Match on your first 6% deferral immediately upon eligibility. Paid Time Off -Flexible Time Off for Exempt (salaried) employees, as well as generous PTO for Non-Exempt (hourly) employees, plus 11 paid company holidays and a paid volunteer day. 12 weeks of Paid Parental Leave Maven Family Planning - provides support through your Parenting journey including egg freezing, fertility, adoption, surrogacy, pregnancy, postpartum, early pediatrics, and returning to work.
AndSOmuch more! We continue to enhance our program, so be sure tocheck our Benefits page here for the latest. Ourteamcan share more during the interview process! Early Warning Services, LLC ("Early Warning") considers for employment, hires, retains and promotes qualified candidates on the basis of ability, potential, and valid qualifications without regard to race, religious creed, religion, color, sex, sexual orientation, genetic information, gender, gender identity, gender expression, age, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law, and as such affirms in policy and practice to support and promote equal employment opportunity and affirmative action, in accordance with all applicable federal, state, and municipal laws. The company also prohibits discrimination on other bases such as medical condition, marital status or any other factor that is irrelevant to the performance of our employees. Early Warning Services LLC is a proud participant in E-Verify, a federal program to help ensure a legal and authorized workforce. As part of our hiring process, we electronically verify the employment eligibility of all new hires through E-Verify. For more information on your rights and responsibilities under E-Verify please visit Home | E-Verify.
|