How to Apply to Splunk

15 min read Last updated April 20, 2026 88 open positions

Key Takeaways

  • Splunk is now the Splunk business unit inside Cisco following the 28 billion dollar acquisition that closed March 18, 2024, with Tom Casey leading the unit after Gary Steele moved into a senior Cisco role, so you are effectively joining Cisco with a Splunk product and brand identity preserved.
  • Applications now go through Cisco's Workday careers portal at jobs.cisco.com, and offers, payroll, benefits, and equity are all Cisco; splunk.com/careers redirects into the same experience.
  • The product surface is unchanged in structure and remains the core reason to join: Splunk Enterprise Security and SOAR on the security side, Splunk Observability Cloud on the observability side, and Splunk Cloud Platform as the underlying delivery model.
  • Expect ongoing post-acquisition workforce actions. There have been multiple rounds of layoffs across Splunk and Cisco in 2024 and 2025 affecting overlapping sales, G and A, and some engineering roles, so do honest diligence on team stability during your recruiter screen.
  • Culture is a genuine mix. Splunk's customer obsession, .conf community, and SPL-centric engineering identity have been preserved and are still the day-to-day experience inside the business unit, while Cisco's corporate governance, financial discipline, and cross-sell motion now shape strategy, headcount, and incentives.
  • San Francisco remains a real engineering hub for Splunk, with significant presences in San Jose, Plano, Boulder, Seattle, and international offices including London, Krakow, Hyderabad, and Sydney; most engineering roles are hybrid with two to three days in office, though selectively remote for senior ICs.
  • SPL fluency is a differentiated and durable skill. Even in a Cisco-owned future, Splunk customers will be writing SPL for many years, and surfacing genuine SPL depth on your resume materially improves your odds across security, observability, and platform roles.
  • Competitive outside options matter for retention. Splunk loses offers to Datadog, Elastic, CrowdStrike, Palo Alto Networks, Snowflake, and Databricks at the senior IC and staff level, so negotiate thoughtfully and expect Cisco recruiters to be prepared for competing offers.
  • For a multi-year bet, the interesting thesis is whether Cisco plus Splunk becomes a genuinely integrated security and observability platform that takes share from Microsoft, Datadog, and Palo Alto, and whether you want to work on that integration versus at a pure-play independent.

About Splunk

Splunk Inc. is an American technology company that built one of the defining platforms for machine data analytics, observability, and security operations, and as of March 2024 it operates as the Splunk business unit inside Cisco Systems following a 28 billion dollar all-cash acquisition that closed on March 18, 2024. Splunk was founded in 2003 in San Francisco by Michael Baum, Rob Das, and Erik Swan with a deceptively simple thesis: logs and machine-generated data contain operational and security truth that is invisible to dashboards built on pre-defined schemas, and a search engine that could index all of that data on the fly would become indispensable to IT operations, engineering, and security teams. The product proved them right, and Splunk grew into a category-defining vendor with a distinctive brand voice, a loyal power-user community, and an annual user conference, Splunk .conf, that remains one of the largest gatherings in observability and security operations. The company went public on NASDAQ under the ticker SPLK in April 2012, expanded through acquisitions of SignalFx (rebranded Splunk Observability Cloud), VictorOps, Phantom (which became Splunk SOAR), Plumbr, Omnition, and Rigor among others, and by the early 2020s was generating more than four billion dollars in annual revenue. The Splunk product surface covers three pillars that Cisco has kept largely intact: Splunk Enterprise Security (the market-leading SIEM), Splunk SOAR for security orchestration and automated response, and Splunk Observability Cloud for metrics, traces, logs, and real-user monitoring, all increasingly delivered as Splunk Cloud Platform rather than self-managed software. Customers include most of the Fortune 500, the largest US federal agencies, global banks, telecoms, retailers, and streaming platforms, and the Search Processing Language (SPL) that Splunk invented is now a genuine job-market skill set of its own. Cisco CEO Chuck Robbins has positioned the Splunk acquisition as the cornerstone of Cisco's security and observability strategy, with Tom Casey, former Splunk EVP of Products and Technology, appointed to lead the Splunk business unit inside Cisco after former Splunk CEO Gary Steele moved into a senior Cisco leadership role. Post-close integration has been real and visible: Splunk corporate functions have been absorbed into Cisco, careers now largely route through Cisco's Workday careers portal, and there have been multiple rounds of post-acquisition workforce reductions across both Splunk and Cisco in 2024 and 2025 as the combined company rationalizes overlapping roles in sales, G and A, and parts of engineering. Culturally, Splunk is being carefully preserved as a product brand, with .conf continuing, SPL remaining central, and San Francisco remaining a major engineering hub, while operationally it now lives inside Cisco's larger machine of financial discipline, enterprise sales motions, and cross-sell with Cisco Security, Meraki, ThousandEyes, and the networking portfolio.

Application Process

  1. 1
    Search openings under the Splunk brand through Cisco's corporate careers site at

    Search openings under the Splunk brand through Cisco's corporate careers site at jobs.cisco.com, which now hosts nearly all Splunk requisitions on Cisco's Workday ATS; the legacy splunk.com/careers URL redirects into the same Cisco-run experience, so expect to create a Cisco candidate profile rather than a separate Splunk one.

  2. 2
    Filter for Splunk-specific roles using keywords like 'Splunk', 'SPL', 'Splunk Cl

    Filter for Splunk-specific roles using keywords like 'Splunk', 'SPL', 'Splunk Cloud', 'Splunk Observability', 'SIEM', 'SOAR', or specific team names such as 'Splunk Enterprise Security' or 'Splunk Platform' to surface the requisitions that still live inside the Splunk business unit versus broader Cisco Security roles.

  3. 3
    Expect a recruiter screen within one to three weeks for shortlisted candidates;

    Expect a recruiter screen within one to three weeks for shortlisted candidates; Cisco recruiters now own Splunk hiring and will calibrate on location, hybrid expectations for the assigned office (San Francisco, San Jose, Plano, Boulder, Seattle, or international hubs), work authorization, current compensation, and post-acquisition stock conversion questions if you were a prior Splunk employee or equity holder.

  4. 4
    For engineering, product, SRE, and security roles, expect a technical screen of

    For engineering, product, SRE, and security roles, expect a technical screen of 45 to 75 minutes with a hiring engineer covering coding, systems fundamentals, and domain depth in SIEM, observability, SOAR, distributed systems, or detection engineering depending on the role; SPL familiarity is a strong plus for any role that touches the core Splunk platform or search layer.

  5. 5
    A hiring manager conversation follows, focused on prior impact at scale, custome

    A hiring manager conversation follows, focused on prior impact at scale, customer-facing experience (Splunk is historically very customer-obsessed), on-call and incident response maturity, and how you reason about security, observability, and reliability problems in real production environments.

  6. 6
    Full interview loops typically run four to six rounds covering coding, system de

    Full interview loops typically run four to six rounds covering coding, system design, architecture deep dive for senior and staff roles, behavioral grounded in Cisco's Conscious Culture principles, and at least one cross-functional round with a product manager, customer success engineer, or partner team; security and detection engineering tracks add threat modeling and SIEM content authoring discussions.

  7. 7
    Offers are typically extended within one to three weeks of the final loop and ar

    Offers are typically extended within one to three weeks of the final loop and are issued by Cisco rather than Splunk, with compensation structured as Cisco base salary plus Cisco RSUs (SPLK shares were cashed out at acquisition close and new grants are in CSCO stock), annual performance bonus, ESPP, benefits, and location-adjusted pay bands; expect Cisco-style background checks, export-control reviews for certain roles, and a longer timeline for any role that touches US federal customers or requires clearance.


Resume Tips for Splunk

recommended

Lead with measurable outcomes tied to Splunk-relevant domains: petabytes per day

Lead with measurable outcomes tied to Splunk-relevant domains: petabytes per day indexed, mean time to detect and respond reduced, SIEM alert volume rationalized, noisy detection rules tuned, observability SLO adherence improved, or dollars saved by replacing prior tooling, always with the baseline and timeframe so the impact is verifiable.

recommended

Treat Splunk Search Processing Language (SPL) as a first-class skill and surface

Treat Splunk Search Processing Language (SPL) as a first-class skill and surface it explicitly when it applies. Name the commands and patterns you actually use (stats, eventstats, tstats, transaction, lookup, rex, eval, bin, timechart, mvexpand) and the content you have authored (correlation searches, data models, CIM normalization, macros, dashboards, SOAR playbooks), since hiring managers can tell SPL depth from a resume in seconds.

recommended

For security and SIEM roles, show detection engineering and incident response de

For security and SIEM roles, show detection engineering and incident response depth honestly: Splunk Enterprise Security (ES) content development, MITRE ATT and CK mapping, threat hunting methodology, SOAR playbook authoring, case management workflows, and collaboration with SOC analysts; call out CISSP, GCIA, GCIH, OSCP, or similar certifications if you hold them, since they signal seriousness to Cisco recruiters.

recommended

For observability roles, translate your background into Splunk Observability Clo

For observability roles, translate your background into Splunk Observability Cloud language (metrics, traces, logs, OpenTelemetry instrumentation, RUM, synthetics, SLOs, APM) and cite concrete work such as instrumenting services, reducing p99 latency, building SLOs that actually changed on-call behavior, or migrating from Datadog, New Relic, Elastic, or Dynatrace to Splunk Observability with measurable results.

recommended

For platform, SRE, and engineering roles, show distributed systems and cloud dep

For platform, SRE, and engineering roles, show distributed systems and cloud depth. Splunk Cloud runs on AWS at very large scale and integrates with GCP and Azure for customer workloads, so familiarity with Kubernetes, Kafka, S3, object-storage architectures, multi-tenancy, capacity planning, and observability of the observability platform itself is directly relevant.

recommended

Mirror the vocabulary in the job description and in Splunk and Cisco product mar

Mirror the vocabulary in the job description and in Splunk and Cisco product marketing: Splunk Cloud Platform, Splunk Enterprise Security, Splunk ES Premium, Splunk SOAR, Splunk Observability Cloud, Splunk Mission Control, Splunk Edge Processor, Data Manager, Ingest Actions, and on the Cisco side Cisco Security Cloud, Hypershield, XDR, and Talos. Mentioning cross-portfolio awareness signals that you understand the post-acquisition strategy.

recommended

Include customer-facing signal for customer success, sales engineering, professi

Include customer-facing signal for customer success, sales engineering, professional services, and specialist roles: number of customer engagements, dollar value of deployments you influenced, workshops delivered at .conf or regional user groups, blog posts, Splunktern or Trust mentorship, and any SplunkLive, BOSS of the SOC, or community contributions.

recommended

Keep the resume to one or two pages with a clean layout, standard fonts, and cle

Keep the resume to one or two pages with a clean layout, standard fonts, and clearly delineated Experience, Skills, Education, and Certifications sections. Cisco's Workday parser is conservative and mishandles multi-column layouts, text boxes, and embedded graphics, so simple beats clever every time.



Interview Culture

Splunk interviews, now run under Cisco's hiring infrastructure but still staffed largely by long-tenured Splunk engineers, product managers, and leaders, are deliberately practical and grounded in the realities of running a petabyte-scale analytics platform that customers bet their security and reliability on. The tone has historically been friendly, curious, and customer-obsessed, with a noticeable bias toward people who can explain complex ideas clearly to non-specialists, and that cultural signature has been preserved through the first two years of Cisco integration. Expect interviewers to push past the surface of your answers, asking why the trade-off you made was the right one, what would break at ten times the scale, how you would know something was wrong in production, and how you would explain the issue to a customer CISO on a Friday evening call. Coding rounds focus on data structures, string and log parsing, concurrency, and correctness under edge cases, and are often grounded in Splunk-like scenarios rather than pure puzzles; for platform and SRE tracks, you will likely see problems that involve parsing, aggregating, or streaming event data. System design rounds are genuinely high-signal because Splunk actually operates the platform under discussion, so prompts often involve designing a log ingestion pipeline, a metrics time-series store, a distributed search layer, a multi-tenant alerting system, or a SOAR automation engine, with probing questions on consistency, tail latency, cost per ingested gigabyte, multi-tenant isolation, backpressure, and graceful degradation. Security interviews include threat modeling, detection engineering exercises such as authoring a correlation search or tuning a noisy rule, and walkthroughs of real incidents you have worked. Behaviorally, Splunk screens for humility, curiosity, and customer obsession, and Cisco has overlaid its Conscious Culture principles around inclusion, trust, and acting ethically, so expect at least one round structured around behavioral questions tied to those values. Interviewers respond very well to candidates who can admit uncertainty, cite specific production lessons, and show genuine care for the customers who run their SOC or their reliability program on the platform, and they respond poorly to rehearsed-sounding answers, vendor trash talk, or confident bluffing on topics you do not actually know. Post-acquisition, decisions now route through Cisco's approval chain, which can add a few days to offer turnaround compared with the pre-acquisition Splunk process, but the bar inside the Splunk business unit has stayed high and the debriefs remain evidence-driven.

What Splunk Looks For

  • Engineers, security professionals, and product thinkers with genuine depth in at least one of Splunk's three pillars (SIEM and security operations, observability, or the underlying platform and search layer), demonstrated through concrete projects rather than buzzwords.
  • Candidates with real customer empathy who understand that Splunk customers are often betting their security posture or reliability on the platform, and who can reason about decisions in terms of customer outcomes rather than internal convenience.
  • Builders with hands-on experience operating distributed systems at scale, whether on AWS, Kubernetes, Kafka, object stores, or telemetry pipelines, and who can articulate multi-tenant, cost-per-gigabyte, and tail-latency trade-offs clearly.
  • Detection engineers, SOC analysts, and security researchers who have authored real SIEM content, tuned it against production noise, mapped it to MITRE ATT and CK, and integrated it with SOAR playbooks and case management workflows.
  • Strong writers and communicators who can produce clear internal docs, customer-facing runbooks, .conf session content, and cross-functional specifications, since Splunk culture rewards writing and Cisco expects formal program management discipline.
  • Collaborative teammates who thrive in a post-acquisition environment where some processes are Splunk-native and some are Cisco corporate, and who can navigate that complexity without cynicism.
  • Owners who take end-to-end responsibility for features, detections, or services including the unglamorous work of migration, deprecation, customer escalations, and on-call during incidents.
  • Long-term-oriented candidates excited by the multi-year arc of converging Splunk and Cisco into a credible security and observability platform that competes with Datadog, CrowdStrike, Palo Alto Networks, Microsoft Sentinel, Elastic, and Dynatrace.

Frequently Asked Questions

What ATS does Splunk use now that it is part of Cisco?
Splunk hiring now runs on Cisco's corporate Workday careers system at jobs.cisco.com, the same platform used for every other Cisco role. The legacy splunk.com/careers URL redirects into the same Cisco-hosted Workday experience. Create a single Cisco candidate profile and reuse it for every Splunk business unit role you apply to. Avoid creating duplicate profiles with different email addresses, since it fragments your application history and can confuse Cisco recruiters who pull your profile during screens. Make sure your profile is complete, including work authorization, location preferences, and self-identification sections, before submitting your first requisition.
Is Splunk still a real thing, or has it been absorbed into Cisco?
Splunk is preserved as a brand and an internal business unit inside Cisco rather than being dissolved into the parent company. The products (Splunk Cloud Platform, Enterprise Security, SOAR, Observability Cloud) continue to ship under the Splunk name, .conf still runs as the annual user conference, and SPL remains the core query language that customers and partners use every day. Corporate functions (payroll, benefits, legal, procurement, IT) have been absorbed into Cisco, executive leadership reports up to Cisco, and sales motions are increasingly integrated with Cisco Security, Meraki, and ThousandEyes for cross-sell. Engineering and product teams still feel like Splunk teams.
What does compensation look like for mid-level engineers in San Francisco?
Post-acquisition, Splunk business unit compensation follows Cisco's pay bands adjusted for Splunk-specific markets. A mid-level software engineer in San Francisco typically sees a total compensation range of roughly 170,000 to 320,000 US dollars, composed of base salary around 160,000 to 220,000, an annual performance bonus in the 10 to 15 percent range, Cisco RSUs vesting over four years, ESPP at a discount, and standard benefits. Senior and staff levels extend substantially higher, and levels.fyi and Glassdoor both have reasonable current distributions. Ranges move with market conditions and level, so confirm the specific band with your Cisco recruiter during the screen.
What happened to my Splunk (SPLK) equity if I was a prior employee?
At acquisition close on March 18, 2024, Splunk became a private subsidiary of Cisco and SPLK stock was cashed out at 157 US dollars per share. Unvested equity at former Splunk employees was converted per the merger agreement terms, typically into Cisco RSUs with the original vesting schedule preserved for continuing employees, or cashed out for departing ones. If you are a former Splunk employee considering returning, any new grant will be denominated in Cisco stock (CSCO), not SPLK. Your recruiter can share the specifics for your exact situation.
Why do Splunk offers get rejected to Datadog, CrowdStrike, Elastic, and Palo Alto Networks?
At the senior IC and staff level, candidates often compare Splunk offers against Datadog, CrowdStrike, Palo Alto Networks, Elastic, Snowflake, and Databricks. The typical reasons to take the other offer are richer equity upside at a pure-play growth company, less post-acquisition integration friction, or a stronger personal thesis on a specific category. The typical reasons to pick Splunk inside Cisco are the larger installed base, the breadth of the platform (SIEM plus observability plus SOAR), the strength of the SPL and customer community, and the financial stability of being inside Cisco. Negotiate with the full picture in mind and ask your recruiter directly about team roadmap and headcount stability.
Has there been post-acquisition attrition or layoffs I should know about?
Yes. Since the March 2024 close, Cisco has executed multiple rounds of workforce reductions across the combined company affecting overlapping roles in sales, general and administrative functions, and selected engineering areas. Public reporting in 2024 and 2025 covered these actions. During your recruiter screen and onsite loop, ask directly about team size, headcount trajectory, hiring manager tenure, and whether the team has been impacted by prior reductions, and confirm that the role is a net new addition rather than backfilling a recent departure.
Is the Splunk culture being preserved or absorbed into Cisco bureaucracy?
The honest answer is both. Cisco leadership has publicly committed to preserving Splunk as a distinct product brand and has kept .conf, the customer community, and the SPL-centric engineering identity intact. Day to day, Splunk teams still feel like Splunk teams, with the same customer obsession and technical depth. At the same time, corporate processes (finance, procurement, legal, hiring, compensation, internal mobility) now follow Cisco standards, which are more formal and slower-moving than pre-acquisition Splunk. Candidates who want a pure-play startup environment will feel the Cisco layer, and candidates who value stability, resources, and cross-portfolio scope will appreciate it.
Do I need to know SPL before applying to engineering roles?
For roles that touch the core Splunk platform, search head, indexer, dispatch layer, Enterprise Security, SOAR, or Splunk Cloud Platform, SPL fluency is a strong plus and often effectively required for detection engineering, customer-facing, and platform engineering roles. For adjacent roles in observability, infrastructure, SRE, or general product engineering, SPL is helpful but not strictly required; you will be expected to pick it up quickly. The free Splunk Fundamentals 1 course, Splunk certifications (Core Certified User, Power User, Admin), and practicing on the BOTS (Boss of the SOC) public datasets are the fastest ways to get functional SPL quickly.
Is Splunk remote, hybrid, or in-office?
Since the Cisco acquisition, the official posture is hybrid, anchored to specific offices including San Francisco (the historic Splunk headquarters), San Jose, Plano, Boulder, Seattle, London, Krakow, Hyderabad, and Sydney, with most engineering and go-to-market roles expecting two to three days per week in the assigned office. Fully remote arrangements still exist for some senior individual contributors and specialist roles, but they are less common than during the pandemic-era Splunk norms. The job posting and recruiter screen will specify the expectation for each requisition, including any relocation expectations for candidates living far from the office.
How should I frame my background if I am coming from a Splunk competitor?
Coming from Datadog, Elastic, Sumo Logic, Dynatrace, New Relic, QRadar, Sentinel, CrowdStrike, or similar is a net positive, not a liability. Splunk interviewers are genuinely interested in how competing platforms solve the same problems, and they appreciate candid, non-defensive answers about where each product is stronger or weaker. Focus on transferable depth (query languages, distributed systems, detection engineering, customer-facing problem solving) rather than product allegiance, avoid trash-talking the prior vendor, and study enough Splunk product material to ask informed questions about how your background maps to the role.

Open Positions

Splunk currently has 88 open positions.

Check Your Resume Before Applying → View 88 open positions at Splunk

Related Resources

Career Guides for Splunk Roles

Similar Companies


Sources