At a Glance
- Tasks: Configure and optimise SIEM/SOAR platforms, focusing on Splunk for security operations.
- Company: Join a leading security operations team in London with a dynamic work culture.
- Benefits: Competitive salary of £65,000 plus benefits, with opportunities for professional growth.
- Other info: Onsite role with potential for career advancement in a fast-paced environment.
- Why this job: Make a real impact in cybersecurity by automating and enhancing security operations.
- Qualifications: 3+ years in SOC/SIEM/SOAR roles with strong Splunk experience required.
The predicted salary is between 65000 - 65000 £ per year.
Location: London (Onsite – 5 days per week)
Salary: £65,000 base + package
NOTE: Candidates for this opportunity must be eligible for UK Security Clearance.
We are seeking a skilled SOC Engineer with a strong focus on SIEM and SOAR technologies to join a high-performing security operations environment. This role is centred on the configuration, optimisation, and integration of enterprise-scale security platforms, with a particular emphasis on Splunk Enterprise Security and Splunk SOAR. You will play a critical role in ensuring these platforms are stable, scalable, and effectively supporting detection engineering, automation, and incident response functions across the SOC.
Key Responsibilities
- Configure, maintain, and optimise SIEM and SOAR platforms, specifically Splunk ES and Splunk SOAR
- Design and implement integrations between SIEM/SOAR and wider security tooling (EDR, vulnerability management, IAM, etc.)
- Develop, enhance, and maintain SOAR playbooks to automate investigation and response workflows
- Support onboarding of log sources into SIEM, ensuring accurate parsing and normalisation
- Optimise search performance, data pipelines, and platform efficiency
- Troubleshoot issues across SIEM/SOAR environments (data ingestion, alerting, integrations, automation workflows)
- Collaborate with Detection Engineers to operationalise detection use cases
- Implement enrichment workflows incorporating threat intelligence, asset context, and identity data
- Support incident response through effective automation and data availability
- Maintain clear and comprehensive documentation for configurations, integrations, and playbooks
Required Skills & Experience
- Minimum 3+ years of commercial experience in SOC, SIEM, SOAR, or security engineering roles
- Strong hands-on experience with Splunk (essential)
- Solid understanding of SIEM architecture and log management principles
- Experience building integrations using APIs and scripting languages (e.g. Python, PowerShell)
- Knowledge of automation and orchestration within security operations
- Familiarity with security tooling such as EDR, IAM, and network security solutions
- Strong troubleshooting and analytical problem-solving capabilities
Desirable Qualifications
- Bachelor’s degree in Cyber Security, IT, or a related discipline (or equivalent experience)
- Splunk Enterprise Certified Admin
- Splunk SOAR Automation Developer certification
- Additional relevant vendor certifications in SIEM/SOAR or security tooling
If you are a hands-on SOC Engineer with deep Splunk expertise and a passion for building scalable, automated security operations, apply today.
SOC Engineer in City of London employer: ANSON MCCADE
Contact Detail:
ANSON MCCADE Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Engineer in City of London
✨Network Like a Pro
Get out there and connect with folks in the industry! Attend meetups, webinars, or even local tech events. The more people you know, the better your chances of landing that SOC Engineer role.
✨Show Off Your Skills
When you get the chance to chat with potential employers, don’t hold back! Share your hands-on experience with Splunk and any cool projects you've worked on. Let them see your passion for SIEM and SOAR technologies.
✨Tailor Your Approach
Every job is different, so make sure you tailor your conversations to highlight how your skills fit their needs. Talk about your experience with integrations and automation, and how you can help optimise their security operations.
✨Apply Through Us!
Don’t forget to apply through our website! We’re always looking for talented SOC Engineers like you. Plus, it’s a great way to ensure your application gets the attention it deserves.
We think you need these skills to ace SOC Engineer in City of London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience with SIEM and SOAR technologies, especially Splunk. We want to see how your skills match the job description, so don’t be shy about showcasing your relevant projects and achievements!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about SOC engineering and how your background makes you a perfect fit for our team. Keep it concise but engaging – we love a good story!
Show Off Your Technical Skills: When filling out your application, make sure to mention your hands-on experience with Splunk and any scripting languages you know. We’re looking for someone who can hit the ground running, so let us know what you bring to the table!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it’s super easy – just follow the prompts and you’ll be all set!
How to prepare for a job interview at ANSON MCCADE
✨Know Your Splunk Inside Out
Make sure you brush up on your Splunk skills before the interview. Be ready to discuss your hands-on experience with Splunk ES and SOAR, including specific examples of how you've configured and optimised these platforms in past roles.
✨Showcase Your Integration Skills
Prepare to talk about your experience with integrating SIEM/SOAR with other security tools. Have a few examples ready where you've successfully built integrations using APIs or scripting languages like Python or PowerShell.
✨Demonstrate Problem-Solving Prowess
Be ready to tackle some troubleshooting scenarios during the interview. Think of specific challenges you've faced in SIEM/SOAR environments and how you resolved them, showcasing your analytical problem-solving capabilities.
✨Highlight Your Documentation Habits
Emphasise the importance of clear documentation in your work. Share how you maintain comprehensive records for configurations, integrations, and playbooks, as this is crucial for effective collaboration in a SOC environment.