About SplunkSplunk is here to build a safer and more resilient digital world.The world's leading enterprises use our unified security and observability platform to keep their digital systems secure and reliable.While customers love our technology, it's our people that make Splunk stand out as an amazing career destination and why we've won so many awards as a best place to work.If you become a Splunker, we want your whole, authentic self, what we call your "million data points".So bring your work experience, problem-solving skills and talent, of course, but also bring your joy, your passion and all the things that make you, you.About The RoleCome and join our growing Splunk Product Security Incident Response Team (PSIRT) of Security Engineers!Be a part of highly visible team that regularly works across the entire organization, with everyone from product teams to executives.Urgent escalations from enterprise customers, investigating open source vulnerabilities, performing variant analysis, root cause analysis, working with security researchers and a regular patching cycle are all core to this role.You'll be part of an organization focused on influencing security culture within Splunk and Cisco with the ultimate goal of ensuring the continued security of our customers and their data.You will do this by leading bug bounty, responsible disclosure, and escalations from Splunk's top customers.What you'll get to do:Triage reported vulnerabilities from the bug bounty and responsible disclosureManually verify security issues identified through automated scansAssist customer escalations concerning product security issuesLead and coordinate Product Security IncidentsWrite and publish Security AdvisoriesCoordinate remediation with Product teamsMust-have QualificationsMinimum Bachelor's Degree with 2+ years' of Application Security ExperienceAt least two years of experience with CSIRT, CIRT, or PSIRT functionsExceptional written communication skillsHands on experience with product security vulnerability exploitation, mitigation, and remediationWorking experience with common security tools (e.g., Burp) or security scanners (e.g., Semgrep, Trivy)Nice-to-have QualificationsPrior experience as a PSIRT engineerCustomer support experienceScripting (e.g., Python, Perl, Ruby, Bash) or development (e.g., C++, Python, JavaScript) experienceAWS or GCP Cloud Experience