Security Markets Specialist

Title: Security Market Specialist
Location: The preferred location for this role is the NYC areas but we will also consider people in Boston, Washington D.C., Atlanta and East Coast Cities.
Join us as we pursue our vision to make machine data accessible, usable and valuable to everyone. We are a company filled with people who are passionate about our product and seek to deliver the best experience for our customers. At Splunk, we're committed to our work, customers, having fun and most significantly to each other's success. Learn more about Splunk careers and how you can become a part of our journey!
Are you passionate about information security? Excited about creating new ways to improve security postures and make our digital world a safer place? If so, we have your dream job within Splunk's Americas Security Specialist team.
Our team is the pre-eminent group within Splunk that provides expert assistance to our field teams in the discipline of information security. We operate daily in four directions: direct customer interaction, field team enablement, evangelizing Splunk's security message to the world, and constant improvement of Splunk's security offerings. Each specialist on our team contributes to these four areas. In this role, you will work cross-functionally, supporting sales, sales engineering, customer success, partners, security marketing, and security product management, among others. You will help the sales teams drive security product booking and adoption, and you will be one of several escalation points for all things security.
This is a team that is in regular motion. You might, on any given day:
Provide expert security industry knowledge in a meeting with customer execs.
Create an externally facing presentation to convey the power of Splunk solutions.
Run a deep-dive workshop with customers to evaluate their various compliance needs, SOC maturity, or effectiveness in using our products.
Run one of our acclaimed Boss of the SOC competitions for one or many customers.
Host an internal webinar to up-level our account teams on a security topic.
Present at an external security conference on a Splunk-relevant topic.
Contribute a blog post to our external blog site detailing a recent engagement or data source or finding.
Strategize with account teams on how to best position Splunk security products to achieve customer success.
Co-author an immersive hands-on workshop to teach our customers about insider threat, adversary hunting, or other popular topics.
Help a technical sales resource execute a particularly challenging product evaluation, with your hands on the keyboard.
Provide feedback to engineering and product teams to improve Splunk's overall product portfolio.
Write code to onboard or manipulate a particularly interesting security-relevant data source.
These are just a few examples - but representative of our typical cadence! A flexible and creative approach is absolutely required in this position - you will be given guidance and support, but never be told exactly what to do, and how to do it. In all of our interactions, we perform as ambassadors and are always professional and courteous in our expert role across Splunk's security portfolio.
Eight + years of career experience, with five+ in the security industry, preferably as a practitioner. A track record of success with a security or security-focused vendor is acceptable.
Up-to-date understanding of current trends in the security market.
Familiarity with common security data sources and their use for basic and advanced detection methods, including Cloud-based data sources.
Familiarity with common security products and their purposes in supporting risk reduction in an organization.
Familiarity with competing SIEM, UEBA and SOAR technologies, and with complementary technologies to Splunk.
Ability to communicate concisely and accurately with no fear of public speaking to audiences large and small.
Ability to work remotely and across multiple time zones with a minimum of daily supervision. Self-starter who manages time and priorities absolutely essential.
Ability to travel 50% within the US and Canada.
5 years of high tech, customer facing experience. This can be in roles like sales engineering, professional services, product management, or similar.
Experience in driving complex security sales cycles up and down a customer org chart.
CISSP, GIAC certification, or equivalent experience.
Experience with security frameworks and models like CIS Controls and MITRE ATT&CK.
Light coding experience (Python preferred) and examples of code you can provide or descriptions of what you've written and what problem it solved.
Experience with anti-fraud or compliance standards.
Experience with Splunk and especially premium security products ES, Phantom, and UBA.
Portfolio of public-facing materials: whitepapers, blogs, presentations, trainings that you have authored.
Bachelor's degree (preferably in) something related to technology, Masters or equivalent a plus.
We value diversity at our company. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or any other applicable legally protected characteristics in the location in which you are applying.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.