At a Glance
- Tasks: Engineer advanced threat detection and optimise SIEM platforms in a hands-on role.
- Company: Respected cyber security operation supporting critical defence environments.
- Benefits: Up to £65,000 salary, excellent benefits, and hybrid working.
- Other info: Opportunities for progression and ongoing professional development.
- Why this job: Join a collaborative team and make a real impact in cyber defence.
- Qualifications: Experience with Splunk or Microsoft Sentinel and strong detection engineering skills.
The predicted salary is between 65000 - 65000 £ per year.
Farnborough (Hybrid – 2 days onsite) Up to £65,000 + Excellent Benefits SC Clearance (or eligibility required)
Ready to engineer the frontline of cyber defence? We’re working with a highly respected cyber security operation supporting critical defence environments, seeking a Detection Engineer to strengthen and evolve advanced threat detection capability across secure enterprise environments.
This is a hands-on technical role where you’ll design, build and optimise detection logic across SIEM platforms, working directly against real-world attacker techniques in a mature, high-performing SOC. You’ll have the autonomy to shape detection strategy, influence capability development, and act as a technical SME within a complex MSSP environment.
What you’ll be doing:
- Engineering and refining advanced SIEM detections across secure environments
- Researching emerging threats and mapping detections to MITRE ATT&CK
- Tuning detections to improve fidelity and reduce false positives
- Supporting SOC analysts and wider engineering teams with technical expertise
- Driving detection maturity and technical standards
What we’re looking for:
- Strong Splunk (SPL) and/or Microsoft Sentinel (KQL) experience
- Detection engineering experience within enterprise or MSSP environments
- Solid understanding of attacker TTPs and threat detection methodologies
- Scripting ability (Python / PowerShell)
- Knowledge of cloud and enterprise infrastructure
- SC Cleared or eligible
Desirable: QRadar, EDR threat hunting, CrowdStrike, Defender for Endpoint.
Why this role: You’ll join a collaborative cyber team working on genuinely meaningful defence-focused projects, with strong progression, ongoing development, and the opportunity to make a measurable impact.
Interested? Apply now or reach out for a confidential conversation.
Locations
Detection Engineer (SIEM) in Farnborough, Hampshire employer: Fynity
Contact Detail:
Fynity Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Detection Engineer (SIEM) in Farnborough, Hampshire
✨Tip Number 1
Network like a pro! Reach out to folks in the cyber security field, especially those working with SIEM tools like Splunk or Microsoft Sentinel. Attend meetups or webinars to connect with potential employers and get your name out there.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your detection engineering projects, especially any work with MITRE ATT&CK mappings or tuning detections. This will give you an edge and demonstrate your hands-on experience.
✨Tip Number 3
Prepare for technical interviews by brushing up on your scripting skills in Python or PowerShell. Be ready to discuss real-world scenarios where you've applied your knowledge of attacker TTPs and threat detection methodologies.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets noticed. Plus, we love seeing candidates who are proactive about their job search.
We think you need these skills to ace Detection Engineer (SIEM) in Farnborough, Hampshire
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Detection Engineer role. Highlight your experience with Splunk, Microsoft Sentinel, and any relevant scripting skills. We want to see how your background aligns with our needs!
Showcase Your Skills: In your cover letter, don’t just list your skills—show us how you've used them in real-world scenarios. Talk about your experience with threat detection and how you’ve contributed to improving detection capabilities in previous roles.
Be Clear and Concise: Keep your application clear and to the point. Use bullet points for easy reading and make sure to highlight your key achievements. We appreciate straightforward communication that gets right to the heart of your qualifications.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows us you’re keen on joining our team!
How to prepare for a job interview at Fynity
✨Know Your SIEM Inside Out
Make sure you brush up on your Splunk and Microsoft Sentinel skills. Be ready to discuss specific examples of how you've engineered detections in the past, and don’t forget to mention any tuning techniques you've used to improve detection fidelity.
✨Understand the MITRE ATT&CK Framework
Familiarise yourself with the MITRE ATT&CK framework and be prepared to talk about how you've mapped detections to it. This shows that you not only understand attacker techniques but can also apply this knowledge practically.
✨Show Off Your Scripting Skills
Since scripting is a key part of the role, be ready to discuss your experience with Python or PowerShell. You might even want to prepare a small example or two of scripts you've written to automate detection processes or improve efficiency.
✨Demonstrate Your Collaborative Spirit
This role involves working closely with SOC analysts and engineering teams. Share examples of how you've collaborated in the past, highlighting your ability to support others and drive technical standards within a team environment.