Job Description

If you’re looking for a meaningful career, you’ll find it here at Webster. Founded in 1935, our focus has always been to put people first--doing whatever we can to help individuals, families, businesses and our colleagues achieve their financial goals. As a leading commercial bank, we remain passionate about serving our clients and supporting our communities. Integrity, Collaboration, Accountability, Agility, Respect, Excellence are Webster’s values, these set us apart as a bank and as an employer.  

Come join our team where you can expand your career potential, benefit from our robust development opportunities, and enjoy meaningful work!

The Splunk Engineer will be responsible for maintaining and optimizing the Security and Technology logging and monitoring infrastructure, as well as developing and implementing threat detection mechanisms using Splunk. The role requires a strong understanding of data management, security practices, Splunk Architecture, and the ability to analyze and interpret complex data sets.


  • Manage and maintain Splunk infrastructure (hybrid) to ensure high availability and optimal performance.
  • Design, develop, and implement Splunk searches, dashboards, and alerts to support the detection of security threats and vulnerabilities.
  • Collaborate with security and IT teams to understand data requirements and develop effective data collection strategies.
  • Monitor and analyze data to identify potential security risks and incidents.
  • Develop and maintain documentation related to Splunk configuration, processes, and procedures.
  • Work closely with stakeholders to understand their data analysis needs and provide effective solutions using Splunk.
  • Troubleshoot and resolve issues related to data ingestion, parsing, and indexing within Splunk.
  • Conduct regular performance tuning and optimization of Splunk infrastructure.
  • Develop correlation searches for security-relevant hunting.
  • Develop and maintain risk-based alerting framework.
  • Optimize log parsing and retention for regulatory requirements.


  • Bachelor’s degree in Computer Science (or equivalent experience), Information Technology, or related field.
  • Proven experience working with Splunk, including the development of complex searches, reports, and dashboards.
  • In-depth understanding of data management principles and best practices.
  • Strong knowledge of security concepts and threat detection methodologies.
  • Experience with scripting languages such as Python or PowerShell for automation and data manipulation.
  • Familiarity with various operating systems, network architecture, and cloud environments.
  • Excellent analytical and problem-solving skills.
  • Strong communication and collaboration abilities, with the capacity to work effectively in a team environment.
  • Experience or understanding of financial industry regulations as they relate to logging and monitoring highly desired.
  • Experience with Phantom/SOAR highly desired.


  • Splunk certification (e.g., Splunk Certified Power User, Splunk Certified Admin, etc ).
  • Experience with SIEM (Security Information and Event Management) systems.
  • Knowledge of regulatory compliance standards such as GDPR, HIPAA, SOX, or PCI DSS.
  • Experience with Phantom/SOAR.

The estimated salary range for this position is $125,000.00 to $145,000.00. Actual salary may vary up or down depending on job-related factors which may include knowledge, skills, experience, and location. In addition, this position is eligible for incentive compensation.



All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.

Application Instructions

Please click on the link below to apply for this position. A new window will open and direct you to apply at our corporate careers page. We look forward to hearing from you!

Apply Online