SIEM/ Threat Detection Engineer, Splunk
SIEM/ Threat Detection Engineer, Splunk

SIEM/ Threat Detection Engineer, Splunk

Full-Time 43200 - 72000 £ / year (est.) No home office possible
H

At a Glance

  • Tasks: Join our team to enhance global Threat Detection services using Splunk.
  • Company: Work with a leading global financial services organization focused on cybersecurity.
  • Benefits: Enjoy a dynamic work environment with opportunities for growth and collaboration.
  • Why this job: Be part of a strategic role that shapes the future of cyber defense.
  • Qualifications: Experience in SIEM Engineering and proficiency in Splunk are essential.
  • Other info: Ideal for those passionate about cybersecurity and eager to make an impact.

The predicted salary is between 43200 - 72000 £ per year.

Harrington Starr have partnered with a leading global financial services organisation for a Threat Detection/ SIEM Engineer with a focus on Splunk.

The role has both technical and strategic importance within the cyber security team and will focus on developing world class Threat Detection services for their SOC. This role operates on a global basis.

Ona day to day basis the role will involve:

  • Splunk Deployment including patch management to ensure health and stability
  • Use case detection including staying up to date with existing attacker techniques and translating them in to business requirements.
  • The on-boarding of log sources in to Splunk
  • Collaborating with the SOC team on security incidents and
  • Maximizing monitoring and detection capabilities of the Splunk platform
  • Working with the Security Operations Manager on the evolving SIEM strategy

In order to be suitable you will need:

  • A solid track record in a SIEM Engineering role with an in-depth knowledge of the Splunk platform
  • Demonstrable experience of working with cyber defense /operations teams including a solid understanding of the incident response process
  • An understanding of automation/ query languages- python, PowerShell, BASH
  • Experience of working within a regulated environment including an understanding of NIST, ISO27001, or other similar frameworks
  • Experience of financial services and experience of working in a cloud environment highly desirable

Please send your CV for immediate review.

SIEM/ Threat Detection Engineer, Splunk employer: Harrington Starr

At Harrington Starr, we pride ourselves on being an exceptional employer, offering a dynamic work environment that fosters innovation and collaboration within our global financial services organization. Our commitment to employee growth is evident through continuous training opportunities and a culture that values strategic contributions to our cyber security team. Join us in developing world-class Threat Detection services while enjoying the benefits of working with cutting-edge technology in a supportive and forward-thinking atmosphere.
H

Contact Detail:

Harrington Starr Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land SIEM/ Threat Detection Engineer, Splunk

✨Tip Number 1

Familiarize yourself with the latest trends and techniques in threat detection and SIEM, especially those related to Splunk. This knowledge will not only help you during interviews but also demonstrate your commitment to staying current in the field.

✨Tip Number 2

Engage with online communities and forums focused on Splunk and cyber security. Networking with professionals in these spaces can provide valuable insights and potentially lead to referrals within the industry.

✨Tip Number 3

Consider obtaining relevant certifications that highlight your expertise in Splunk and SIEM technologies. Certifications can significantly enhance your profile and show employers that you are serious about your professional development.

✨Tip Number 4

Prepare to discuss specific use cases where you've successfully implemented or improved threat detection strategies. Real-world examples will showcase your experience and problem-solving skills, making you a more attractive candidate.

We think you need these skills to ace SIEM/ Threat Detection Engineer, Splunk

Splunk Deployment
Patch Management
Use Case Detection
Cyber Defense Operations
Incident Response Process
Automation Skills
Query Languages (Python, PowerShell, BASH)
Regulatory Compliance (NIST, ISO27001)
Financial Services Experience
Cloud Environment Experience
Collaboration Skills
Monitoring and Detection Capabilities
Strategic Thinking
Problem-Solving Skills

Some tips for your application 🫡

Tailor Your CV: Make sure your CV highlights your experience with SIEM engineering and specifically your knowledge of the Splunk platform. Include relevant projects or roles that demonstrate your skills in cyber defense and incident response.

Highlight Technical Skills: Clearly list your technical skills, especially your proficiency in automation/query languages like Python, PowerShell, and BASH. Mention any experience you have with regulated environments and frameworks such as NIST or ISO27001.

Showcase Collaboration Experience: Emphasize your ability to work collaboratively with SOC teams on security incidents. Provide examples of how you've contributed to team efforts in threat detection and incident response.

Express Your Interest: In your cover letter, express your enthusiasm for the role and the company. Discuss why you are interested in working in a global financial services organization and how you can contribute to their SIEM strategy.

How to prepare for a job interview at Harrington Starr

✨Showcase Your Splunk Expertise

Be prepared to discuss your hands-on experience with the Splunk platform. Highlight specific projects where you deployed Splunk, managed patches, or developed use cases. This will demonstrate your technical proficiency and understanding of the tool's capabilities.

✨Understand Cyber Defense Operations

Familiarize yourself with the incident response process and be ready to share examples of how you've collaborated with cyber defense teams. Discuss any relevant experiences that showcase your ability to work effectively in a SOC environment.

✨Demonstrate Knowledge of Regulatory Frameworks

Since the role involves working within a regulated environment, be prepared to discuss your understanding of frameworks like NIST or ISO27001. Share how you've applied these standards in previous roles to enhance security measures.

✨Highlight Automation Skills

Discuss your experience with automation and query languages such as Python, PowerShell, or BASH. Provide examples of how you've used these skills to improve efficiency in threat detection or incident response processes.

SIEM/ Threat Detection Engineer, Splunk
Harrington Starr
H
  • SIEM/ Threat Detection Engineer, Splunk

    Full-Time
    43200 - 72000 £ / year (est.)

    Application deadline: 2027-01-27

  • H

    Harrington Starr

Similar positions in other companies
UK’s top job board for Gen Z
discover-jobs-cta
Discover now
>