Resume and JobRESUME AND JOB
Kaiser Permanente logo

Cyber Risk Defense Consultant V - Splunk Privacy Developer

Kaiser Permanente

Software and Technology Jobs

Cyber Risk Defense Consultant V - Splunk Privacy Developer

full-timePosted: Jan 13, 2026

Job Description

Job Summary:

Kaiser Permanente is expanding our Cyber Risk Defense program and seeking a highly skilled individual which can facilitate department missions in the areas of data science and python development with deep expertise in the Splunk Enterprise platform. This unique role focuses on supporting the mission of Cyber Security and is a technical expert in developing advanced machine learning solutions to enhance cyber threat, privacy, and compliance across clinical systems. As the position requires significant individual contributions, the successful candidate will present with qualifications commensurate with the expert-level position, demonstrate knowledge of clinical systems/workflows, and possess hands-on experience building and maintaining anomaly detection models. Experience with machine-learning frameworks/algorithms like Random Forest, XGBoost, and creating solutions on Unix based systems with Python is necessary for success. Enabling secure healthcare delivery to tens of millions of people is mission-critical, and this position will create and manage enterprise-class, unsupervised machine learned cyber threat and privacy use cases on an enterprise-class Splunk platform.

This senior level employee is primarily responsible for overseeing the maintenance and protection of integrity and reliability of the security of data, systems and networks.


Essential Responsibilities:
  • Conducts or oversees business-specific projects by applying deep expertise in subject area; promoting adherence to all procedures and policies; developing work plans to meet business priorities and deadlines; determining and carrying out processes and methodologies; coordinating and delegating resources to accomplish organizational goals; partnering internally and externally to make effective business decisions; solving complex problems; escalating issues or risks, as appropriate; monitoring progress and results; recognizing and capitalizing on improvement opportunities; evaluating recommendations made; and influencing the completion of project tasks by others.
  • Practices self-leadership and promotes learning in others by building relationships with cross-functional stakeholders; communicating information and providing advice to drive projects forward; influencing team members within assigned unit; listening and responding to, seeking, and addressing performance feedback; adapting to competing demands and new responsibilities; providing feedback to others, including upward feedback to leadership and mentoring junior team members; creating and executing plans to capitalize on strengths and improve opportunity areas; and adapting to and learning from change, difficulties, and feedback.
  • Leads team in the proactive monitoring and/or response to known or emerging threats against the KP network.
  • Effectively communicates investigative findings to non-technical audiences.
  • Plans and facilitates regular operations meeting with Cyber Risk Defense Center (CRDC) teams.
  • Supports closed loop processes on security efforts by providing feedback to the TDA leads and/or leadership.
  • Participates in information fusion procedures across operations and engineering, including activities such as Use Case planning/development, Use Case quality assurance validation, and response procedure documentation.
  • Serves as a liaison between stage teams and upper management by identifying issues, improvement areas, or security/architectural gaps and suggesting appropriate improvements.
  • Drives the development of the CRDC intellectual capital by leading process or procedure improvements, consulting on brown bag training sessions, and leading the development of new training documents.
  • Partners with the CRDC Policy Engineers and Remediation teams to contain identified issues and determine the best approach for improving security posture.
  • Facilitates follow-up remediation design and review efforts.
  • Leads the investigation and triage of security events across multiple domains.
  • Leads complex data analyses in support of security event management processes, including root cause analysis.
  • Coordinates the response and resolution of high impact or critical cyber security incidents.
  • Leads the deployment of threat detection capabilities and/or incident response plans which may include after-hours support and coordination among responsible teams.
  • Drives the execution of incident detection and/or handling processes which may include containment, protection, and remediation activities.

Locations

  • Greenwood Village, Colorado, United States

Salary

Estimated Salary Rangemedium confidence

90,000 - 150,000 USD / yearly

Source: ai estimated

* This is an estimated range based on market data and may vary based on experience and qualifications.

Skills Required

  • Splunk Enterprise platformintermediate
  • Data scienceintermediate
  • Python developmentintermediate
  • Machine learning (Random Forest, XGBoost)intermediate
  • Anomaly detection modelsintermediate
  • Cyber threat detectionintermediate
  • Privacy and complianceintermediate
  • Unix systemsintermediate

Required Qualifications

  • Deep expertise in Splunk (experience)
  • Knowledge of clinical systems/workflows (experience)
  • Hands-on experience building and maintaining anomaly detection models (experience)
  • Expert-level qualifications (experience)

Responsibilities

  • Oversee maintenance and protection of data, systems, networks security
  • Conduct or oversee business-specific projects
  • Develop advanced machine learning solutions for cyber threat, privacy, compliance
  • Create and manage enterprise-class unsupervised machine learned cyber threat and privacy use cases on Splunk
  • Apply deep expertise in subject area
  • Develop work plans, coordinate resources
  • Solve complex problems
  • Monitor progress and results

Target Your Resume for "Cyber Risk Defense Consultant V - Splunk Privacy Developer" , Kaiser Permanente

Get personalized recommendations to optimize your resume specifically for Cyber Risk Defense Consultant V - Splunk Privacy Developer. Takes only 15 seconds!

AI-powered keyword optimization
Skills matching & gap analysis
Experience alignment suggestions

Check Your ATS Score for "Cyber Risk Defense Consultant V - Splunk Privacy Developer" , Kaiser Permanente

Find out how well your resume matches this job's requirements. Get comprehensive analysis including ATS compatibility, keyword matching, skill gaps, and personalized recommendations.

ATS compatibility check
Keyword optimization analysis
Skill matching & gap identification
Format & readability score

Tags & Categories

Splunk Enterprise platformData sciencePython developmentMachine learning (Random Forest, XGBoost)Anomaly detection modelsCyber threat detectionPrivacy and complianceUnix systemsHealthcare

Answer 10 quick questions to check your fit for Cyber Risk Defense Consultant V - Splunk Privacy Developer @ Kaiser Permanente.

Quiz Challenge
10 Questions
~2 Minutes
Instant Score

Related Books and Jobs

No related jobs found at the moment.

Kaiser Permanente logo

Cyber Risk Defense Consultant V - Splunk Privacy Developer

Kaiser Permanente

Software and Technology Jobs

Cyber Risk Defense Consultant V - Splunk Privacy Developer

full-timePosted: Jan 13, 2026

Job Description

Job Summary:

Kaiser Permanente is expanding our Cyber Risk Defense program and seeking a highly skilled individual which can facilitate department missions in the areas of data science and python development with deep expertise in the Splunk Enterprise platform. This unique role focuses on supporting the mission of Cyber Security and is a technical expert in developing advanced machine learning solutions to enhance cyber threat, privacy, and compliance across clinical systems. As the position requires significant individual contributions, the successful candidate will present with qualifications commensurate with the expert-level position, demonstrate knowledge of clinical systems/workflows, and possess hands-on experience building and maintaining anomaly detection models. Experience with machine-learning frameworks/algorithms like Random Forest, XGBoost, and creating solutions on Unix based systems with Python is necessary for success. Enabling secure healthcare delivery to tens of millions of people is mission-critical, and this position will create and manage enterprise-class, unsupervised machine learned cyber threat and privacy use cases on an enterprise-class Splunk platform.

This senior level employee is primarily responsible for overseeing the maintenance and protection of integrity and reliability of the security of data, systems and networks.


Essential Responsibilities:
  • Conducts or oversees business-specific projects by applying deep expertise in subject area; promoting adherence to all procedures and policies; developing work plans to meet business priorities and deadlines; determining and carrying out processes and methodologies; coordinating and delegating resources to accomplish organizational goals; partnering internally and externally to make effective business decisions; solving complex problems; escalating issues or risks, as appropriate; monitoring progress and results; recognizing and capitalizing on improvement opportunities; evaluating recommendations made; and influencing the completion of project tasks by others.
  • Practices self-leadership and promotes learning in others by building relationships with cross-functional stakeholders; communicating information and providing advice to drive projects forward; influencing team members within assigned unit; listening and responding to, seeking, and addressing performance feedback; adapting to competing demands and new responsibilities; providing feedback to others, including upward feedback to leadership and mentoring junior team members; creating and executing plans to capitalize on strengths and improve opportunity areas; and adapting to and learning from change, difficulties, and feedback.
  • Leads team in the proactive monitoring and/or response to known or emerging threats against the KP network.
  • Effectively communicates investigative findings to non-technical audiences.
  • Plans and facilitates regular operations meeting with Cyber Risk Defense Center (CRDC) teams.
  • Supports closed loop processes on security efforts by providing feedback to the TDA leads and/or leadership.
  • Participates in information fusion procedures across operations and engineering, including activities such as Use Case planning/development, Use Case quality assurance validation, and response procedure documentation.
  • Serves as a liaison between stage teams and upper management by identifying issues, improvement areas, or security/architectural gaps and suggesting appropriate improvements.
  • Drives the development of the CRDC intellectual capital by leading process or procedure improvements, consulting on brown bag training sessions, and leading the development of new training documents.
  • Partners with the CRDC Policy Engineers and Remediation teams to contain identified issues and determine the best approach for improving security posture.
  • Facilitates follow-up remediation design and review efforts.
  • Leads the investigation and triage of security events across multiple domains.
  • Leads complex data analyses in support of security event management processes, including root cause analysis.
  • Coordinates the response and resolution of high impact or critical cyber security incidents.
  • Leads the deployment of threat detection capabilities and/or incident response plans which may include after-hours support and coordination among responsible teams.
  • Drives the execution of incident detection and/or handling processes which may include containment, protection, and remediation activities.

Locations

  • Greenwood Village, Colorado, United States

Salary

Estimated Salary Rangemedium confidence

90,000 - 150,000 USD / yearly

Source: ai estimated

* This is an estimated range based on market data and may vary based on experience and qualifications.

Skills Required

  • Splunk Enterprise platformintermediate
  • Data scienceintermediate
  • Python developmentintermediate
  • Machine learning (Random Forest, XGBoost)intermediate
  • Anomaly detection modelsintermediate
  • Cyber threat detectionintermediate
  • Privacy and complianceintermediate
  • Unix systemsintermediate

Required Qualifications

  • Deep expertise in Splunk (experience)
  • Knowledge of clinical systems/workflows (experience)
  • Hands-on experience building and maintaining anomaly detection models (experience)
  • Expert-level qualifications (experience)

Responsibilities

  • Oversee maintenance and protection of data, systems, networks security
  • Conduct or oversee business-specific projects
  • Develop advanced machine learning solutions for cyber threat, privacy, compliance
  • Create and manage enterprise-class unsupervised machine learned cyber threat and privacy use cases on Splunk
  • Apply deep expertise in subject area
  • Develop work plans, coordinate resources
  • Solve complex problems
  • Monitor progress and results

Target Your Resume for "Cyber Risk Defense Consultant V - Splunk Privacy Developer" , Kaiser Permanente

Get personalized recommendations to optimize your resume specifically for Cyber Risk Defense Consultant V - Splunk Privacy Developer. Takes only 15 seconds!

AI-powered keyword optimization
Skills matching & gap analysis
Experience alignment suggestions

Check Your ATS Score for "Cyber Risk Defense Consultant V - Splunk Privacy Developer" , Kaiser Permanente

Find out how well your resume matches this job's requirements. Get comprehensive analysis including ATS compatibility, keyword matching, skill gaps, and personalized recommendations.

ATS compatibility check
Keyword optimization analysis
Skill matching & gap identification
Format & readability score

Tags & Categories

Splunk Enterprise platformData sciencePython developmentMachine learning (Random Forest, XGBoost)Anomaly detection modelsCyber threat detectionPrivacy and complianceUnix systemsHealthcare

Answer 10 quick questions to check your fit for Cyber Risk Defense Consultant V - Splunk Privacy Developer @ Kaiser Permanente.

Quiz Challenge
10 Questions
~2 Minutes
Instant Score

Related Books and Jobs

No related jobs found at the moment.