Skip to main content
Back to search results

Senior Splunk Engineer

Denver, Colorado;
Apply Refer a friend
Apply

Job Description:

At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.

Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates’ physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.

Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations.

At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!
 

Job Description:
 

Our Security Operations and Threat Response team within Bank of America’s Cyber Security Technology function works to continuously strengthen the bank’s cyber security posture through partnership and delivery of technology to support our content detection and threat hunt teams.  This team works with partners in Cyber Security Operations to deliver robust technology solutions and support for detection engineering environments and content scenarios.

Role Responsibilities:

The position of Senior Splunk Engineer is responsible for working directly with our Splunk team to analyze, triage, and support data transformation initiatives.  This role will be at the forefront of enhancing our security data environment to provide optimal up time of the platform.  This role will be critical in doing analysis and providing both tactical and strategic enhancements to the platform on behalf of cyber security technology and operations teams.    The role will also be expected to actively share knowledge and mentor more junior members of the Security Operations and Threat Response team.

The role will work with all Cyber Defense operational and technical teams within Global Information Security (GIS) to gain insight into critical security controls and architectural specifics to develop valuable detection strategies and analytics that identify malicious behavior accurately. This role advises on product assessments, policy adjustments, and architectural transformations that impact the global enterprise.  Furthermore, the role will be a thought leader in the design of cutting-edge detective, preventative, and proactive controls. The role will need hands on technical acumen with writing efficient SPL within short timelines to support detection needs of the firm.

Required Qualifications:

  • Minimum of 6+ years of experience in a technical role in the areas of Security Operations, Incident Response, Content Development or Equivalent Experience in a large Enterprise Splunk Environment performing triage and administrative duties.
  • Direct experience performing content detection engineering and threat hunting in an active corporate environment.
  • Significant experience working with Splunk Procedure Language to create and tune detections.
  • Experience mapping data fields to a common data model such as CEF, OCSF.
  • Direct experience working with very large datasets and log analysis tools including but not limited to: Splunk, Python, Pandas, SQL, Hadoop, Hue
  • Ability to see the larger picture when dealing with competing requirements and needs from across the organization in order to build consensus and drive results.
  • Ability to navigate and work effectively across a complex, geographically dispersed organization.
  • Experience with enterprise scale EDR, SIEM, and SOAR tools.
  • Experience in requirements gathering around the Splunk tool, documenting requirements, requirement analysis, product testing, etc.
  • Splunk Infrastructure Management Experience/Knowledge  
  • Collaborate with teams to Monitor and optimize the performance of the Splunk environment, to ensure efficient data processing and search capabilities on our search heads.
  • Ability to troubleshoot, triage and resolve issues related to Splunk Infrastructure, ensuring high availability and reliability.
  • Experience in Splunk enterprise and Splunk Cloud

Data Ingestion and Parsing:

  • Design and implement data ingestion strategies for various log sources into Splunk.
  • Develop and maintain parsing configurations to normalize and enrich incoming data for effective analysis.
  • Collaborate with application owners and IT teams to onboard new data sources into Splunk.
  • Search and Reporting:
  • Create and optimize search queries and reports to extract valuable insights from the indexed data.
  • Customize and implement Splunk dashboards for different stakeholders to visualize key performance indicators and security metrics.

Security and Compliance:

  • Implement security best practices within Splunk to safeguard sensitive data.
  • Collaborate with the security team to configure and monitor alerts for suspicious activities or security incidents.
  • Ensure compliance with industry regulations and internal policies related to log management and data retention.
  • Automation and Scripting:
  • Develop automation scripts using SPL (Search Processing Language) and other scripting languages to streamline administrative tasks.
  • Continuously seek opportunities to improve efficiency through automation in Splunk processes.

Documentation and Training:

  • Maintain thorough documentation of Splunk configurations, processes, and troubleshooting procedures.
  • Provide training and support to other IT team members on Splunk best practices and usage.
  • Experience consuming, analyzing, and reporting Cyber Threat Intelligence for actionable takeaways
  • Demonstrated ability to self-direct, with minimal supervision to achieve assigned goals.

Desired Qualifications:

  • Experience with offensive security tools and integration of SIEM, SOAR, CSPM and other technical integrations within large enterprise networks.
  • Knowledge of basic Data Science concepts and processes.
  • Experience performing security analysis and threat hunting in Cloud environments such as Azure, M365, AWS
  • Experience Maintaining KV Stores. 
  • Experience Performing Regular Updates/Upgrades on Splunk Apps and Add-ons. As well as the Splunk environment as a whole.

Skills:

  • Influence
  • Result Orientation
  • Solution Design
  • Stakeholder Management
  • Technical Strategy Development
  • Access and Identity Management
  • Critical Thinking
  • Cyber Security
  • Information Systems Management
  • Risk Management
  • Collaboration
  • DevOps Practices
  • Financial Management
  • Solution Delivery Process
  • Test Engineering

This job will be open and accepting applications for a minimum of seven days from the date it was posted.

Shift:

1st shift (United States of America)

Hours Per Week: 

40

Learn more about this role

Apply Refer a friend
Apply

Full time

JR-25033699

Manages People: No

Travel: Yes, 5% of the time

Age requirement: Must at least be 18 years of age.

Colorado pay and benefits information

Colorado pay range:

$98,400.00 - $158,200.00 annualized salary, offers to be determined based on experience, education and skill set.

Discretionary incentive eligible

This role is eligible to participate in the annual discretionary plan. Employees are eligible for an annual discretionary award based on their overall individual performance results and behaviors, the performance and contributions of their line of business and/or group; and the overall success of the Company.

Benefits

This role is currently benefits eligible. We provide industry-leading benefits, access to paid time off, resources and support to our employees so they can make a genuine impact and contribute to the sustainable growth of our business and the communities we serve.

Illinois pay and benefits information

Illinois pay range:

$98,400.00 - $158,200.00 annualized salary, offers to be determined based on experience, education and skill set.

Discretionary incentive eligible

This role is eligible to participate in the annual discretionary plan. Employees are eligible for an annual discretionary award based on their overall individual performance results and behaviors, the performance and contributions of their line of business and/or group; and the overall success of the Company.

Benefits

This role is currently benefits eligible. We provide industry-leading benefits, access to paid time off, resources and support to our employees so they can make a genuine impact and contribute to the sustainable growth of our business and the communities we serve.

Washington, DC pay and benefits information

Washington, DC pay range:

$98,400.00 - $158,200.00 annualized salary, offers to be determined based on experience, education and skill set.

Discretionary incentive eligible

This role is eligible to participate in the annual discretionary plan. Employees are eligible for an annual discretionary award based on their overall individual performance results and behaviors, the performance and contributions of their line of business and/or group; and the overall success of the Company.

Benefits

This role is currently benefits eligible. We provide industry-leading benefits, access to paid time off, resources and support to our employees so they can make a genuine impact and contribute to the sustainable growth of our business and the communities we serve.