At a Glance
- Tasks: Join our team to enhance global Threat Detection services using Splunk.
- Company: Work with a leading global financial services organization focused on cybersecurity.
- Benefits: Enjoy a dynamic work environment with opportunities for growth and collaboration.
- Why this job: Be part of a strategic role that shapes the future of cyber defense.
- Qualifications: Experience in SIEM Engineering and proficiency in Splunk are essential.
- Other info: Ideal for those passionate about cybersecurity and eager to make an impact.
The predicted salary is between 43200 - 72000 £ per year.
Harrington Starr have partnered with a leading global financial services organisation for a Threat Detection/ SIEM Engineer with a focus on Splunk.
The role has both technical and strategic importance within the cyber security team and will focus on developing world class Threat Detection services for their SOC. This role operates on a global basis.
Ona day to day basis the role will involve:
- Splunk Deployment including patch management to ensure health and stability
- Use case detection including staying up to date with existing attacker techniques and translating them in to business requirements.
- The on-boarding of log sources in to Splunk
- Collaborating with the SOC team on security incidents and
- Maximizing monitoring and detection capabilities of the Splunk platform
- Working with the Security Operations Manager on the evolving SIEM strategy
In order to be suitable you will need:
- A solid track record in a SIEM Engineering role with an in-depth knowledge of the Splunk platform
- Demonstrable experience of working with cyber defense /operations teams including a solid understanding of the incident response process
- An understanding of automation/ query languages- python, PowerShell, BASH
- Experience of working within a regulated environment including an understanding of NIST, ISO27001, or other similar frameworks
- Experience of financial services and experience of working in a cloud environment highly desirable
Please send your CV for immediate review.
SIEM/ Threat Detection Engineer, Splunk employer: Harrington Starr
Contact Detail:
Harrington Starr Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SIEM/ Threat Detection Engineer, Splunk
✨Tip Number 1
Familiarize yourself with the latest trends and techniques in threat detection and SIEM, especially those related to Splunk. This knowledge will not only help you during interviews but also demonstrate your commitment to staying current in the field.
✨Tip Number 2
Engage with online communities and forums focused on Splunk and cyber security. Networking with professionals in these spaces can provide valuable insights and potentially lead to referrals within the industry.
✨Tip Number 3
Consider obtaining relevant certifications that highlight your expertise in Splunk and SIEM technologies. Certifications can significantly enhance your profile and show employers that you are serious about your professional development.
✨Tip Number 4
Prepare to discuss specific use cases where you've successfully implemented or improved threat detection strategies. Real-world examples will showcase your experience and problem-solving skills, making you a more attractive candidate.
We think you need these skills to ace SIEM/ Threat Detection Engineer, Splunk
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience with SIEM engineering and specifically your knowledge of the Splunk platform. Include relevant projects or roles that demonstrate your skills in cyber defense and incident response.
Highlight Technical Skills: Clearly list your technical skills, especially your proficiency in automation/query languages like Python, PowerShell, and BASH. Mention any experience you have with regulated environments and frameworks such as NIST or ISO27001.
Showcase Collaboration Experience: Emphasize your ability to work collaboratively with SOC teams on security incidents. Provide examples of how you've contributed to team efforts in threat detection and incident response.
Express Your Interest: In your cover letter, express your enthusiasm for the role and the company. Discuss why you are interested in working in a global financial services organization and how you can contribute to their SIEM strategy.
How to prepare for a job interview at Harrington Starr
✨Showcase Your Splunk Expertise
Be prepared to discuss your hands-on experience with the Splunk platform. Highlight specific projects where you deployed Splunk, managed patches, or developed use cases. This will demonstrate your technical proficiency and understanding of the tool's capabilities.
✨Understand Cyber Defense Operations
Familiarize yourself with the incident response process and be ready to share examples of how you've collaborated with cyber defense teams. Discuss any relevant experiences that showcase your ability to work effectively in a SOC environment.
✨Demonstrate Knowledge of Regulatory Frameworks
Since the role involves working within a regulated environment, be prepared to discuss your understanding of frameworks like NIST or ISO27001. Share how you've applied these standards in previous roles to enhance security measures.
✨Highlight Automation Skills
Discuss your experience with automation and query languages such as Python, PowerShell, or BASH. Provide examples of how you've used these skills to improve efficiency in threat detection or incident response processes.