Security Strategist -Anti-Fraud Focus

  • Splunk
  • Ohio City, OH Plano, TX Denver, CO Boulder, CO Cincinnati, OH
  • Jul 05, 2019
Full time Sales

Job Description

Security Strategist -Anti-Fraud Focus

Join us as we pursue our disruptive new vision to enable the world to turn data into doing. We are a company filled with people who are passionate about our product and seek to deliver the best experience for our customers. At Splunk, we’re committed to our work, customers, having fun and most significantly to each other’s success. Learn more about Splunk careers and how you can become a part of our journey!


Our Security Strategist team is a global-level group within Splunk that provides expert assistance to our field teams in the discipline of Information Security. We operate daily in five directions: field team enablement, evangelizing Splunk’s security message to the world, direct customer interaction, supporting our security partner ecosystem, and constant improvement of Splunk’s security offerings. Each specialist on our team contributes to these areas. In this role, you will work cross-functionally, supporting sales, sales engineering, customer success, partners, Security marketing, and Security product management, among others. For this role specifically, you will have a dotted-line responsibility to the Security Market Group as they work to bring more formal Fraud Detection solutions to the market that encompass some of Splunk’s newest product offerings, including Phantom and DFS/DSP.

You will help build a fraud practice in collaboration with other Specialists and with the Security Market Group, A significant portion of your activity will be working with the sales teams to not only drive fraud use case success, but to feed knowledge gained back into the product management, marketing, and engineering teams to influence anti-fraud solutions. We also will be tailoring our anti-fraud use cases for several verticals including telecommunications, FSI, and healthcare.

This role can be located anywhere in the continental US, but proximity to a major airport is required. At least 50% travel should be expected.


This is a team that is in regular motion. You might, on any given day:

  • Provide expert industry knowledge in a meeting with customer execs.
  • Help a technical sales resource execute a particularly challenging evaluation, with your hands on the keyboard.
  • Create an externally facing presentation to convey the power of Splunk solutions.
  • Run one of our acclaimed Boss of the SOC competitions for one or many customers.
  • Host an internal webinar to up-level our account teams on a security topic.
  • Present at an external security conference on a Splunk-relevant topic.
  • Contribute a blog post to our external blog site detailing a recent engagement or data source or finding.
  • Run a deep-dive workshop with customers to evaluate their various compliance needs, SOC maturity, or effectiveness in using our products.
  • Strategize with account teams on how to best position Splunk Security products to achieve customer success.
  • Write code to onboard or manipulate a particularly interesting security-relevant data source.
  • Co-author an immersive hands-on workshop to teach our customers about insider threat, adversary hunting, or other popular topics.
  • File enhancement or bug reports about issues you have found in our products.

These are just a few examples – but representative of our typical cadence! A flexible and creative approach is absolutely required in this position – you will be given guidance and support, but never be told exactly what to do, and how to do it.


Five+ years of experience in the security industry, preferably as a practitioner, but a track record of success with a security or security-focused vendor is acceptable. 


    • Up-to-date understanding of current trends in the security market.
  • Expert understanding of a particular security related discipline, like APT, fraud, endpoint, compliance frameworks, etc.
    • Familiarity with common security data sources and their use for basic and advanced detection methods, including Cloud-based data sources.
    • Familiarity with common security products and their purposes in supporting risk reduction in an organization.
    • Familiarity with competing SIEM and UEBA technologies, and with complementary technologies to Splunk.
  • Familiarity with competing technologies specific to your discipline(s) e.g. other fraud detection solutions
  • Ability to communicate concisely and accurately with no fear of public speaking to audiences large and small.
  • Ability to work remotely and across multiple time zones with a minimum of daily supervision. Self-starter absolutely essential.
  • Ability to travel 50% within the US and Canada.


  • 5 years of high tech, customer facing experience. This can be in roles like sales engineering, professional services, product management, or similar.
  • Experience in driving complex security sales cycles up and down a customer org chart.
  • CISSP, GCIH, GIAC, GCIA or equivalent experience.
  • Light coding experience (Python preferred) and examples of code you can provide or descriptions of what you’ve written and what problem it solved.
  • Experience with anti-fraud or compliance.
  • Portfolio of public-facing materials: whitepapers, blogs, presentations, trainings that you have authored.
  • Bachelor’s degree in something related to technology, Masters or equivalent a plus.

We value diversity at our company. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or any other applicable legally protected characteristics in the location in which you are applying.