At a Glance
- Tasks: Join us as an Elastic Security Specialist, mastering SIEM and Elastic Stack daily.
- Company: Be part of a dynamic team in London/Birmingham, leading the charge in cybersecurity.
- Benefits: Enjoy hybrid work options, competitive pay, and opportunities for professional growth.
- Why this job: Dive into exciting challenges, enhance your skills, and make a real impact in security.
- Qualifications: Expertise in Elastic SIEM, scripting, and threat intelligence is essential.
- Other info: Ideal for tech-savvy individuals eager to innovate in a fast-paced environment.
The predicted salary is between 43200 - 72000 £ per year.
I am hiring for Elastic Security Specialist (ELK/SIEM)
Location: London / Birmingham - Hybrid
- Expert-level knowledge of Elastic SIEM / Elastic Security and Elastic Stack architecture.
- Proficiency in Elasticsearch Query DSL, EQL, and Kibana dashboarding.
- Hands-on experience with Beats (Filebeat, Winlogbeat, Auditbeat) and Elastic Agent.
- Strong scripting skills (Python, Shell, or Painless).
- Experience with ingesting threat intelligence (STIX/TAXII) and IOC integration.
- Deep understanding of MITRE ATT&CK, kill chain, and SOC operations.
- Proficient in building and optimizing Logstash pipelines and Ingest Pipelines using processors like grok, dissect, kv, etc.
- Hands-on experience with Elastic Agent policies, including log, metric, and uptime integrations via Fleet.
- Familiarity with Filebeat and Metricbeat modules for standard log ingestion (system, nginx, docker, Kubernetes, etc.).
Key Skills: Elastic Security / Logstash / Kibana / Filebeat / Elastic Stack
Elastic Security Specialist (ELK/SIEM) employer: GIOS Technology
Contact Detail:
GIOS Technology Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Elastic Security Specialist (ELK/SIEM)
✨Tip Number 1
Network with professionals in the Elastic community. Attend meetups, webinars, or conferences related to Elastic Security and SIEM. Engaging with others in the field can provide insights into job openings and company culture.
✨Tip Number 2
Showcase your hands-on experience with Elastic Stack tools. If you have personal projects or contributions to open-source projects, be ready to discuss them in detail during interviews. Practical knowledge often stands out more than theoretical understanding.
✨Tip Number 3
Familiarise yourself with the latest trends and updates in Elastic Security and SIEM. Follow relevant blogs, forums, and social media channels to stay informed. This will not only help you in interviews but also demonstrate your passion for the field.
✨Tip Number 4
Prepare for technical interviews by practising common scenarios related to Elastic Security. Be ready to solve problems on the spot, such as optimising Logstash pipelines or writing EQL queries. This practical preparation can set you apart from other candidates.
We think you need these skills to ace Elastic Security Specialist (ELK/SIEM)
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your expert-level knowledge of Elastic SIEM and the Elastic Stack architecture. Include specific examples of your experience with Elasticsearch Query DSL, EQL, and Kibana dashboarding.
Showcase Relevant Experience: Detail your hands-on experience with Beats and Elastic Agent. Mention any projects where you ingested threat intelligence or worked with MITRE ATT&CK frameworks to demonstrate your practical skills.
Highlight Scripting Skills: Emphasise your scripting abilities in Python, Shell, or Painless. Provide examples of how you've used these skills to optimise Logstash pipelines or manage Elastic Agent policies.
Craft a Strong Cover Letter: Write a cover letter that connects your skills and experiences directly to the job description. Explain why you're passionate about Elastic Security and how you can contribute to the company's success.
How to prepare for a job interview at GIOS Technology
✨Showcase Your Technical Expertise
Be prepared to discuss your expert-level knowledge of Elastic SIEM and the Elastic Stack architecture. Highlight specific projects where you've implemented these technologies, and be ready to answer technical questions that demonstrate your proficiency in Elasticsearch Query DSL and EQL.
✨Demonstrate Hands-On Experience
Share examples of your hands-on experience with Beats and Elastic Agent. Discuss how you've used Filebeat, Winlogbeat, or Auditbeat in real-world scenarios, and be ready to explain the impact of your work on security operations.
✨Understand Threat Intelligence Integration
Familiarise yourself with ingesting threat intelligence using STIX/TAXII and IOC integration. Be prepared to discuss how you have integrated threat intelligence into your previous roles and the benefits it brought to the security posture.
✨Know Your MITRE ATT&CK Framework
A deep understanding of the MITRE ATT&CK framework is crucial. Be ready to discuss how you've applied this knowledge in SOC operations and how it has influenced your approach to building and optimising Logstash pipelines.