At a Glance
- Tasks: Join the Threat Detection team to build and improve detection rules using Splunk.
- Company: Work with a leading financial services organisation at the heart of Europe's financial infrastructure.
- Benefits: Enjoy flexible remote work options with only 8 days on-site per month.
- Why this job: Be part of a mature SOC environment, safeguarding vital financial systems globally.
- Qualifications: Hands-on experience in a SOC, strong Splunk skills, and excellent communication in English required.
- Other info: Contract position with market competitive rates and potential for extension.
The predicted salary is between 36000 - 60000 £ per year.
Join one of Europes most respected financial organizations, a cornerstone of the continents financial stability and infrastructure.
This is your opportunity to step into a mature, high-performing Security Operations Centre that plays a pivotal role in protecting the backbone of Europes financial systems. Youll be part of a mission-driven environment where precision, innovation, and collaboration truly matter.
Job Title: Threat Detection Engineer
Location: Brussels OR Amsterdam OR London – Hybrid
Duration: 12 Month Extendable Freelance Mission (Extendable)
Start Date: October / November 2025
As a Threat Detection Engineer, youll play a vital part in enhancing and maintaining advanced detection capabilities within a secure, large-scale SOC. Your expertise in Splunk and use case development will directly influence how threats are detected, analyzed, and responded to across the organization.
You will:
- Design, build, and fine-tune detection rules in Splunk (SPL, ES, CIM, and log normalization).
- Develop, document, and maintain SIEM use cases that strengthen the organizations detection framework.
- Lead and guide technical initiatives within the Threat Detection team to ensure continuous improvement.
- Advise on SIEM architecture and security tooling, bringing deep technical insight to detection strategies.
- Manage and prioritize detection tasks, balancing proactive threat hunting with operational response needs.
What You Bring
- Proven experience as a Threat Detection Engineer or similar role within a SOC environment.
- Advanced hands-on experience with Splunk, including SPL development and Enterprise Security (ES).
- Demonstrated ability to create and enhance use cases that detect and mitigate evolving threats.
- Solid understanding of cybersecurity principles, frameworks, and best practices.
- Strong communication skills in English you can translate technical detection logic into actionable insights.
This will be an Inside IR35 Role.
Please attach updated CV for immediate consideration!
Threat Detection Engineer employer: Next Ventures
Contact Detail:
Next Ventures Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Threat Detection Engineer
✨Tip Number 1
Familiarise yourself with Splunk and its functionalities, especially SPL, ES, and CIM. Consider setting up a personal project or lab environment to practice building detection rules and use cases, as hands-on experience will set you apart.
✨Tip Number 2
Network with professionals in the cybersecurity field, particularly those who work in SOC environments. Engaging with others can provide insights into the role and may even lead to referrals, increasing your chances of landing an interview.
✨Tip Number 3
Stay updated on the latest cybersecurity threats and trends. Being knowledgeable about current events in the industry will not only help you in interviews but also demonstrate your passion and commitment to the field.
✨Tip Number 4
Prepare to discuss your previous experiences in threat detection and how you've contributed to improving security measures. Be ready to share specific examples that highlight your problem-solving skills and technical expertise.
We think you need these skills to ace Threat Detection Engineer
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your hands-on experience as a Threat Detection Engineer, especially your proficiency with Splunk and use case development skills. Use specific examples to demonstrate your expertise in a SOC environment.
Craft a Strong Cover Letter: Write a cover letter that showcases your understanding of the role and the importance of threat detection in financial services. Mention your relevant certifications and how they align with the job requirements.
Highlight Communication Skills: Since excellent communication skills are essential for this role, provide examples in your application that demonstrate your ability to communicate complex technical information clearly and effectively.
Follow Application Instructions: Ensure you send your updated CV and rate as specified in the job posting. Double-check that you have included all required documents and that your application is submitted through our website for immediate consideration.
How to prepare for a job interview at Next Ventures
✨Showcase Your Splunk Skills
Make sure to highlight your hands-on experience with Splunk during the interview. Be prepared to discuss specific use cases you've developed and how you've improved detection rules in previous roles.
✨Understand Cybersecurity Protocols
Demonstrate a solid grasp of cybersecurity protocols and practices. You might be asked about how you would handle certain threats or scenarios, so brush up on your knowledge and be ready to share relevant examples.
✨Communicate Clearly
Excellent communication skills are essential for this role. Practice explaining complex technical concepts in simple terms, as you may need to convey information to non-technical stakeholders.
✨Prepare for Technical Questions
Expect technical questions related to SIEM tools and threat detection tasks. Review common challenges faced in SOC environments and think about how you would prioritise and manage these tasks effectively.