At a Glance
- Tasks: Join a team to develop and automate cyber-security detection and response solutions.
- Company: Work with a leading financial institution focused on cyber security innovation.
- Benefits: Enjoy a full-time role with opportunities for growth in a dynamic tech environment.
- Why this job: Make a real impact in cyber security while collaborating with top professionals in the field.
- Qualifications: 3+ years in cyber detection engineering; experience with SOAR and SIEM tools required.
- Other info: Based in Glasgow, this role offers a chance to work on cutting-edge technology.
The predicted salary is between 28800 - 48000 ÂŁ per year.
2 days ago Be among the first 25 applicants
Get AI-powered advice on this job and more exclusive features.
Direct message the job poster from mthree
Talent Manager for Alumni PRO & Expert at mthree | IT | Technology | Cyber Security | Business Operations
SIEM / SOAR Developer – Cyber Security Platform Developer
A great opportunity to be working with one of the world\’s leading financial institutions, supporting their cyber response platforms.
Primary Responsibilities
The Cyber Response Platform team is looking for an experienced cyber-security professional to join their team as a SIEM/SOAR content developer. The ideal candidate has hands-on experience in computer network defence working either in or for a Security Operations Center or Cyber Incident Response Team.
You will join a team of technologists and cyber-security professionals that are dedicated to improving the coverage, quality and automation of cyber-security detection and response.
- Develop playbooks and automation in SOAR with analysts to improve efficiency of the SOC.
- Develop analytics in Splunk (SPL) or Elastic Search (EQL) to detect actionable security alerts.
- Design and develop integrations to connect to internal and external services.
- Work alongside incident response analysts to automate the response to security incidents and improve security response coverage.
- Perform analysis of security posture including recommending improvements to controls and processes.
- Automate auxiliary team processes with SOAR playbooks.
- Monitor and support SIEM and SOAR platforms to ensure security and stability of SOC infrastructure.
Skills required (essential)
- Minimum of 3 years of experience in cyber detection engineering or incident response
- Minimum of 1 year of experience developing automations in SOAR
- Experience in the creation and management of detection logic in SIEMs (e.g Splunk, ArcSight, Microsoft Sentinel)
- Strong knowledge of exploitation techniques (e.g. MITRE ATT&CK) and use-case development
- Thorough TCP/IP and protocol experience (OSI L2-L7, DNS, HTTP, REST, SOAP)
- Strong communication, task management and organizational skills
- Highly experienced with Unix/Linux command-line tools and shell scripting
- Experience within the application of Indicators of Compromise (e.g. YARA rules, STIX and TAXII)
- Strong hands-on experience with a query language (e.g Splunk’s SPL or Elastic’s EQL, SQL)
- Experience with streaming data frameworks (e.g. Kafka, NiFi, Spark)
- Experience with CI/CD technology (e.g Jenkins, GitLab CI, GitHub Actions)
- Experience in the administration of systems (e.g. servers, desktops) or security controls (AV, Endpoint, IDS)
- Experience deploying to, and leveraging cloud environments (e.g. AWS, Azure, Google)
Seniority level
-
Seniority level
Associate
Employment type
-
Employment type
Full-time
Job function
-
Job function
Information Technology
-
Industries
IT Services and IT Consulting, Financial Services, and Investment Banking
Referrals increase your chances of interviewing at mthree by 2x
Sign in to set job alerts for “Platform Specialist” roles.
Glasgow, Scotland, United Kingdom 1 week ago
Glasgow, Scotland, United Kingdom 3 months ago
Glasgow, Scotland, United Kingdom 1 week ago
Graduate Software Developer (Java/Python)
Glasgow, Scotland, United Kingdom 1 day ago
Glasgow, Scotland, United Kingdom 1 month ago
Frontend software engineer (React) – Europe Remote
Glasgow, Scotland, United Kingdom $35,000.00-$40,000.00 1 month ago
Glasgow, Scotland, United Kingdom 1 month ago
Glasgow, Scotland, United Kingdom 1 month ago
Full Stack Software Engineer – Associate
Glasgow, Scotland, United Kingdom 6 days ago
Glasgow, Scotland, United Kingdom 2 days ago
Glasgow, Scotland, United Kingdom 12 hours ago
Glasgow, Scotland, United Kingdom 2 weeks ago
Glasgow, Scotland, United Kingdom 6 days ago
Glasgow, Scotland, United Kingdom 1 week ago
Glasgow, Scotland, United Kingdom 2 weeks ago
Glasgow, Scotland, United Kingdom 6 days ago
Glasgow, Scotland, United Kingdom 1 week ago
Glasgow, Scotland, United Kingdom 2 weeks ago
East Kilbride, Scotland, United Kingdom 12 hours ago
Glasgow, Scotland, United Kingdom 1 week ago
Glasgow, Scotland, United Kingdom 2 weeks ago
Glasgow, Scotland, United Kingdom 2 weeks ago
Junior Software Engineer – Cross-platform C++ – Multipass
Glasgow, Scotland, United Kingdom 1 month ago
Glasgow, Scotland, United Kingdom 1 week ago
Glasgow, Scotland, United Kingdom 22 hours ago
Glasgow, Scotland, United Kingdom 8 hours ago
Glasgow, Scotland, United Kingdom 8 hours ago
Glasgow, Scotland, United Kingdom 2 hours ago
Glasgow, Scotland, United Kingdom 2 days ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Security Platform Developer employer: mthree
Contact Detail:
mthree Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Security Platform Developer
✨Tip Number 1
Network with professionals in the cyber security field, especially those who work in Security Operations Centers or Cyber Incident Response Teams. Attend industry events or webinars to connect with potential colleagues and learn more about the latest trends and technologies.
✨Tip Number 2
Familiarise yourself with the specific tools mentioned in the job description, such as Splunk and SOAR platforms. Consider setting up a personal project or lab environment to practice your skills in developing playbooks and automations.
✨Tip Number 3
Stay updated on the latest cyber threats and exploitation techniques by following relevant blogs, podcasts, and forums. This knowledge will not only help you in interviews but also demonstrate your passion for the field.
✨Tip Number 4
Prepare to discuss your hands-on experience with incident response and detection engineering during interviews. Be ready to share specific examples of how you've contributed to improving security posture or automating processes in previous roles.
We think you need these skills to ace Security Platform Developer
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in cyber detection engineering and incident response. Emphasise your hands-on experience with SIEMs and SOAR, as well as any specific tools like Splunk or Elastic Search.
Craft a Strong Cover Letter: In your cover letter, explain why you are passionate about cyber security and how your skills align with the responsibilities of the role. Mention specific projects or achievements that demonstrate your expertise in automation and incident response.
Showcase Technical Skills: Clearly list your technical skills related to the job description, such as your experience with Unix/Linux command-line tools, query languages, and cloud environments. Use bullet points for clarity and impact.
Highlight Communication Skills: Since strong communication is essential for this role, provide examples of how you've effectively communicated complex technical information to non-technical stakeholders or collaborated with teams in previous positions.
How to prepare for a job interview at mthree
✨Showcase Your Technical Skills
Be prepared to discuss your hands-on experience with SIEM and SOAR platforms. Highlight specific projects where you've developed playbooks or automated processes, as this will demonstrate your practical knowledge and problem-solving abilities.
✨Understand the Cyber Security Landscape
Familiarise yourself with current cyber threats and exploitation techniques, especially those related to the MITRE ATT&CK framework. This knowledge will help you engage in meaningful discussions about security posture and incident response strategies.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that assess your ability to respond to security incidents. Think through past experiences where you had to analyse a situation, recommend improvements, or automate responses, and be ready to share these examples.
✨Communicate Clearly and Confidently
Strong communication skills are essential in this role. Practice articulating your thoughts clearly, especially when discussing complex technical concepts. This will not only showcase your expertise but also your ability to work collaboratively within a team.