Home
/
Comprehensive
/
Principal Threat Intelligence Analyst (US Remote Available)
Principal Threat Intelligence Analyst (US Remote Available)-February 2024
CA
Feb 10, 2026
About Principal Threat Intelligence Analyst (US Remote Available)

  Splunk is here to build a safer and more resilient digital world. The world's leading enterprises use our unified security and observability platform to keep their digital systems secure and reliable. While customers love our technology, it's our people that make Splunk stand out as an amazing career destination and why we've won so many awards as a best place to work. If you become a Splunker, we want your whole, authentic self, what we call your "million data points". So bring your work experience, problem-solving skills and talent, of course, but also bring your joy, your passion and all the things that make you, you.

  Role Summary

  This role will be responsible for delivering on the threat intelligence mission, which includes understanding the sophisticated threats that Splunk may be exposed to and owning the collection, analysis, and dissemination of intelligence to support internal customers. The nature of the work may occasionally include afterhours support during major incidents. You are self-motivated and passionate about tracking threat actors, including a desire to automate and improve ingestion of threat data. We are a hard-working team who has fun, enjoys a good laugh but above all else thinks security first.

  Meet the Team

  The Principal Intelligence Analyst will report to the Senior Manager, Threat Hunting and Intelligence in our fast-growing Global Security Operations organization. As a member of THI, you will work with our multi-functional peer teams such as Threat Hunt, Detection Engineering, SOC, Advanced Response and others to ensure that Splunk is always prepared for emergent threats.

  What you'll get to do

  Lead operations to produce tactical to strategic level threat intelligence products, both cadenced and ad-hoc, for Splunk including fresh indicators, TTPs, behavioral patterns, and threat actor profiles

  Craft responses to RFIs from internal customers that provides decision advantage as well as review and edit written products produced by junior analysts

  Lead efforts to integrate threat data into SIEM solution

  Own end to end the development of threat landscape reporting

  Develop scripts and/or API automation to improve processing

  Must-have Qualifications

  10-12+ years or more of professional IT or IT Security experience; and 5+ years as a full-time cyber threat intelligence analyst

  Experience with open source and threat intelligence specific vendor tooling

  Experience leading threat actor and campaign attribution

  Demonstrable understanding of structured analytical techniques including, but not limited to Quality of Information Check, Analysis of Competing Hypotheses, Key Assumptions Check, Signposts and Indicators, and Gap Analysis

  Detailed understanding of the MITRE ATT&CK Framework, the Diamond Model of Intrusion Analysis and/or the Cyber Kill Chain

  Solid grasp of Cloud technologies with a robust understanding of Windows, Linux and OSX

  Strong critical thinking and the ability to recognize and avoid biases in analysis are vital for this role as you will need to advise decision-makers on the best course of action based on often incomplete and subjective information. Ability to produce clear, concise, and timely reporting with a proven attention to detail

  Nice-to-have Qualifications

  We’ve taken special care to separate the must-have qualifications from the nice-to-haves. “Nice-to-have” means just that: Nice. To. Have. So, don’t worry if you can’t check off every box. We’re not hiring a list of bullet points–we’re interested in the whole you.

  Robust network of relationships with external threat intelligence teams

  Specific experience with VirusTotal, DomainTools, ThreatConnect, Recorded Future, and/or Crowdstrike

  Experience performing searching and reporting with Splunk

  Ability to reduce large datasets into meaningful information

  Loves sharing information via presentations and prose for a variety of technical and non-technical audiences

  Expertise in uncovering adversary activity not detected by industry detection rules

  Splunk is an Equal Opportunity Employer

  At Splunk, we believe creating a culture of belonging isn’t just the right thing to do; it’s also the smart thing. We prioritize diversity, equity, inclusion, and belonging to ensure our employees are supported to bring their best, most authentic selves to work where they can thrive. Qualified applicants receive consideration for employment without regard to race, religion, color, national origin, ancestry, sex, gender, gender identity, gender expression, sexual orientation, marital status, age, physical or mental disability or medical condition, genetic information, veteran status, or any other consideration made unlawful by federal, state, or local laws. We consider qualified applicants with criminal histories, consistent with legal requirements.

  Note:

  Base Pay Range

  SF Bay Area, Seattle Metro, and New York City Metro Area

  Base Pay Range: $171,200.00 - 235,400.00 per year

  California (excludes SF Bay Area), Washington (excludes Seattle Metro), Washington DC Metro, and Massachusetts

  Base Pay Range: $156,000.00 - 214,500.00 per year

  All other cities and states excluding California, Washington, Massachusetts, New York City Metro Area and Washington DC Metro Area.

  Base Pay Range: $143,200.00 - 196,900.00 per year

  Splunk provides flexibility and choice in the working arrangement for most roles, including remote and/or in-office roles. We have a market-based pay structure which varies by location. Please note that the base pay range is a guideline and for candidates who receive an offer, the base pay will vary based on factors such as work location as set out above, as well as the knowledge, skills and experience of the candidate. In addition to base pay, this role is eligible for incentive compensation and may be eligible for equity or long-term cash awards.

  Benefits are an important part of Splunk's Total Rewards package. This role is eligible for a competitive benefits package which includes medical, dental, vision, a 401(k) plan and match, paid time off and much more! Learn more about our comprehensive benefits and wellbeing offering at https://splunkbenefits.com .

Comments
Welcome to zdrecruit comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Show More Comments
SIMILAR JOBS
Clinical Nurse IV
Clinical Nurse IV Oakland, CA Highland General Hospital HGH Nursing Administration Services As Needed / Per Diem - Night Management Req #:38765-28401 FTE:0.01 Posted:January 22, 2024 Summary SUMMARY:
eCOB Specialist I
WARNING: Please beware of phishing scams that solicit interviews or promote work-at-home opportunities, some of which may pose as legitimate companies. Elevance Health requires a completed online app
Médico/a ocupacional
...
Deputy Design Build Manager – Highway Roadway Transportation
Company Description Work with Us. Change the World. At AECOM, we're delivering a better world. Whether improving your commute, keeping the lights on, providing access to clean water, or transforming
Strategic Accounts Manager (MT Portfolio)
SME Events and Media is seeking a results-driven Strategic Accounts Manager who can deliver a consultative customer sales approach to managing the events, media, and sponsorship portfolios for a sele
Ivanti Service Manager 999211
Job TypeFull-timeDescriptionAbacus SolutionsGroup: We're built on our shared core values! We aredifference-makers, passionate about serving, we work hard with integrityand do the right thing. Differe
Software Engineer, Systems
Summary: Meta Platforms, Inc. (Meta), formerly known as Facebook Inc., builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed
Associate Director, Regional Regulatory Affairs
Associate Director, Regional Regulatory Affairs - 2406163548W Description Essential Job Duties and Responsibilities The Regional Regulatory Leader Asia Pacific (AP) (Associate Director) is a member o
Cashier/Sales Associate - Midday/2nd Shift
Overview Step into the heart of the day as a Mid/Second Shift Associate! This shift is perfect for those who enjoy the bustling midday and early evening hours. Our convenience store and gas station b
Retail Customer Service Cashier
Req ID: 428903 Address: 1600 Loop 254 W. Ranger, TX, 76470 Benefits: * Paid Time Off * Flexible Scheduling * 401(k) – 100% Match up to 5% * Medical/Dental/Vision Insurance after 30 days * Competitive
Copyright 2023-2026 - www.zdrecruit.com All Rights Reserved