Security Specialist
IBM Corporation
Coppell, TX
Full-time
Other
Posted on April 13, 2025
Security Specialist
IBM Corporation
Coppell, TX
(Up to 100% telecommuting permitted): Act as Splank Soar Engineer to develop and maintain a Splunk Phantom environment. Author, test, and maintain automation scripts/workflows within SOAR platform. Design, implement, and maintain efficient and reusable Python code. Review, debug, and resolve technical issues throughout all stages of SDLC. Integrate SOAR platform with other security tools and APIs to execute automated workflows. Coordinate with system administrators, engineers, and ISSOs to provision service accounts, grant required permissions. Assist with process development and process improvement for security operations to include creation/modification of SOPs, playbooks, and work instructions. Measure effectiveness of process improvement and automation efforts via metrics and KPIs. Create, modify, tune IDS signatures/SIEM correlation searches/yara rules, other detection signatures. Create, modify, update, and maintain Python and PowerShell scripts that enhance endpoint detection capabilities. Utilize: Splunk, Splunk Enterprise Security, Splunk SOAR (Security Orchestration automation and response), Python, SOAR case management. Required: Bachelor’s degree or equivalent in Computer Science, Information Systems, Engineering or related and two (2) years of experience as a Security Operations Center (SOC) Analyst, Incident Responder or related. Two (2) years of experience must include utilizing Splunk, Splunk Enterprise Security, Splunk SOAR (Security Orchestration automation and response), Python, SOAR case management. $159681 to $163500 per year. Please send resumes to recruitad@us.ibm.com. Applicants must reference V147 in the subject line.
IBM Corporation
Coppell, TX
(Up to 100% telecommuting permitted): Act as Splank Soar Engineer to develop and maintain a Splunk Phantom environment. Author, test, and maintain automation scripts/workflows within SOAR platform. Design, implement, and maintain efficient and reusable Python code. Review, debug, and resolve technical issues throughout all stages of SDLC. Integrate SOAR platform with other security tools and APIs to execute automated workflows. Coordinate with system administrators, engineers, and ISSOs to provision service accounts, grant required permissions. Assist with process development and process improvement for security operations to include creation/modification of SOPs, playbooks, and work instructions. Measure effectiveness of process improvement and automation efforts via metrics and KPIs. Create, modify, tune IDS signatures/SIEM correlation searches/yara rules, other detection signatures. Create, modify, update, and maintain Python and PowerShell scripts that enhance endpoint detection capabilities. Utilize: Splunk, Splunk Enterprise Security, Splunk SOAR (Security Orchestration automation and response), Python, SOAR case management. Required: Bachelor’s degree or equivalent in Computer Science, Information Systems, Engineering or related and two (2) years of experience as a Security Operations Center (SOC) Analyst, Incident Responder or related. Two (2) years of experience must include utilizing Splunk, Splunk Enterprise Security, Splunk SOAR (Security Orchestration automation and response), Python, SOAR case management. $159681 to $163500 per year. Please send resumes to recruitad@us.ibm.com. Applicants must reference V147 in the subject line.