At a Glance
- Tasks: Join us as a Splunk Developer to enhance threat detection for our banking clients.
- Company: Work with a leading financial institution in vibrant cities like London, Paris, Brussels, or Amsterdam.
- Benefits: Enjoy hybrid work options and competitive daily rates between £500 - £800.
- Why this job: Be part of a dynamic team, improving cybersecurity while developing your technical skills.
- Qualifications: Experience with SIEM use cases and proficiency in Splunk's search processing language (SPL) required.
- Other info: Minimum office presence of eight days per month; perfect for those who thrive in fast-paced environments.
The predicted salary is between 36000 - 60000 £ per year.
Duration: 1 year
Rate: 500 - 800 per day
Hybrid: 2 days onsite per week (London, Paris, Brussels or Amsterdam)
Role:
- Interact with the different customers to capture and define requirements for the development and testing of the threat detection capabilities.
- Cooperate with log source onboarding team to assure correct log source onboarding and log mapping to data models according to Splunk standard processes.
- The development and tuning and continuous improvement of correlation rules.
- Develop and maintain dashboards, reports, and alerts.
- Create Splunk Knowledge Objects to address customers' needs in context of using Splunk as a security tool.
- Prepare correlation search tests, conduct tests, and document evidence from tests that show correlation search addresses scenario described in use case.
- Responsible for the creation of procedures, high-level/low-level documentation, implementation of processes and development of staff in relation to SIEM detection logic.
- Coach a team (from a technical perspective); review work outputs and provide quality assurance.
- Analyse and identify areas of improvement with existing processes, procedures, and documentation.
- Demonstrate how to use SIEM & Enterprise Security products to both technical/non-technical personnel.
- Provide expert technical advice and counsel in the design, monitoring and improvement of SIEM security systems.
- Prioritise and coordinate backlog of threat detection requests, making sure we have a healthy balance between defect resolution and new features.
Qualifications:
Technical Skills:
- In-depth experience in development and maintenance of SIEM use cases.
- Fluent in Splunk's search processing language (SPL).
- Excellent knowledge of Splunk Enterprise and Splunk Enterprise Security.
- Sound knowledge about Splunk Common Information Model and log normalization using Data Models.
- Solid understanding of cybersecurity technologies, protocols, and applications.
- Excellent English communication skills (written and oral).
Nice to have:
- Splunk Core Certified (Advanced) Power User (crucial).
- Splunk Certified Developer (nice to have).
- Splunk Enterprise Certified Admin (nice to have).
- Splunk Enterprise Security Certified Admin (nice to have).
- Any other Security Certifications (e.g. CEH, GIAC, CISSP, OSCP).
Soft Skills:
- Strong analytical skills to evaluate sophisticated multivariate problems and find a systematic approach to gain a quick resolution, often under stress.
- Strong problem solving, documentation, process execution, time management and organisational skills.
- Ability to communicate sophisticated information, concepts, or ideas in a confident and well-organised manner through verbal, written, and/or visual means.
- Fast and independent learner, with ambition to self-improve.
- At ease in a fast-changing environment, flexible and pragmatic, open-minded.
- Accurate, acting with attention to details.
- Client focus and delivery oriented.
- A team-focused mentality with ability to work & collaborate effectively in a team environment.
- Good leadership and communication skills, whether on the field, in the team or with management.
- A good relationship builder with strong diplomacy skills.
- Ability to work autonomously.
Remote working: A minimum office presence of eight days per month is required.
Contact Detail:
Salt Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Splunk Developer (Threat Detection Consultant)
✨Tip Number 1
Familiarise yourself with Splunk's search processing language (SPL) and the Common Information Model. Being able to demonstrate your proficiency in these areas during discussions can set you apart from other candidates.
✨Tip Number 2
Network with professionals in the cybersecurity field, especially those who work with SIEM systems. Engaging in conversations about threat detection and sharing insights can help you gain valuable knowledge and potentially lead to referrals.
✨Tip Number 3
Prepare to discuss specific examples of how you've developed and tuned correlation rules in past roles. Real-world scenarios will showcase your expertise and problem-solving skills effectively during interviews.
✨Tip Number 4
Stay updated on the latest trends and technologies in cybersecurity. Being knowledgeable about current threats and solutions will not only enhance your discussions but also demonstrate your commitment to continuous learning.
We think you need these skills to ace Splunk Developer (Threat Detection Consultant)
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience with Splunk, SIEM use cases, and any relevant certifications. Use keywords from the job description to demonstrate that you meet the qualifications.
Craft a Strong Cover Letter: In your cover letter, explain why you're interested in the role and how your skills align with the responsibilities outlined in the job description. Mention specific experiences that showcase your analytical and problem-solving abilities.
Showcase Technical Skills: Clearly outline your proficiency in Splunk's search processing language (SPL) and your experience with cybersecurity technologies. Provide examples of past projects where you've developed or improved threat detection capabilities.
Highlight Soft Skills: Don't forget to mention your soft skills, such as communication, teamwork, and leadership. Provide examples of how you've successfully collaborated with others or led a team in previous roles.
How to prepare for a job interview at Salt
✨Showcase Your Technical Skills
Make sure to highlight your experience with Splunk, especially your proficiency in SPL and your understanding of SIEM use cases. Be prepared to discuss specific projects where you've developed or maintained threat detection capabilities.
✨Demonstrate Problem-Solving Abilities
Prepare examples of how you've tackled complex problems in previous roles. Discuss your analytical skills and how you've approached multivariate issues, particularly in a fast-paced environment.
✨Communicate Clearly and Confidently
Since the role requires interaction with both technical and non-technical personnel, practice explaining complex concepts in simple terms. This will showcase your communication skills and ability to adapt your message to different audiences.
✨Emphasise Team Collaboration
Be ready to talk about your experience working in teams, especially in a coaching or leadership capacity. Highlight instances where you've coordinated work among diverse groups and built strong relationships within your team.