At a Glance
- Tasks: Enhance security operations by developing detections and improving response workflows.
- Company: Join a forward-thinking company focused on cybersecurity innovation.
- Benefits: Competitive salary, flexible work options, and opportunities for professional growth.
- Why this job: Make a real impact in the fight against cyber threats with cutting-edge tools.
- Qualifications: Experience with Google SecOps and Splunk SIEM, plus strong analytical skills.
- Other info: Fast-paced environment with excellent career advancement opportunities.
The predicted salary is between 36000 - 60000 £ per year.
We are seeking a proactive and technically strong Detection & Response Engineer to enhance our Security Operations capabilities. This role focuses on SIEM engineering, detection development, and SOC process improvement. You will play a key role in improving threat detection coverage, reducing response times, and strengthening overall security monitoring.
Key Responsibilities
- Work hands‑on with Google SecOps and Splunk SIEM platforms
- Identify required log sources and lead log onboarding and normalization into the SIEM
- Design, build, and tune detections, correlation rules, and alert logic
- Develop and maintain SOC playbooks and response runbooks
- Collaborate with SOC analysts and incident responders to improve detection and response workflows
- Continuously optimize SIEM content to reduce false positives and improve alert quality
- Support incident response and threat‑hunting activities as needed
- Align detections with frameworks such as MITRE ATT&CK
Required Skills & Experience
- Hands‑on experience with Google SecOps
- Strong practical experience with Splunk SIEM
- Proven experience onboarding and parsing log sources
- Experience building detections and correlation rules
- Experience creating SOC playbooks/runbooks
- Solid understanding of SOC operations and incident response processes
- Knowledge of attacker tactics, techniques, and procedures (TTPs)
Preferred Skills
- Threat hunting experience
- Scripting or automation skills (e.g., Python)
- Security certifications (e.g., GCIA, GCIH, Splunk certifications)
- Experience with cloud security monitoring
Ideal Candidate Profile
- Analytical and detail‑oriented
- Strong problem‑solving mindset
- Able to work in fast‑paced SOC environments
- Good communication and collaboration skills
For more information and to apply contact me at jude.russell@next-ventures.com
Cyber Security Engineer in Reading employer: Next Ventures
Contact Detail:
Next Ventures Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Security Engineer in Reading
✨Tip Number 1
Network like a pro! Reach out to folks in the cyber security field, especially those working with SIEM platforms like Google SecOps and Splunk. Attend meetups or webinars to make connections that could lead to job opportunities.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your experience with log onboarding, detection development, and SOC processes. This can really set you apart when you're chatting with potential employers.
✨Tip Number 3
Prepare for interviews by brushing up on your knowledge of attacker tactics and incident response processes. Be ready to discuss how you've improved detection workflows or reduced false positives in past roles.
✨Tip Number 4
Don't forget to apply through our website! We love seeing candidates who are proactive and passionate about cyber security. Plus, it’s a great way to ensure your application gets the attention it deserves.
We think you need these skills to ace Cyber Security Engineer in Reading
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your hands-on experience with Google SecOps and Splunk SIEM. We want to see how your skills align with the key responsibilities listed in the job description, so don’t hold back on showcasing your relevant experience!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about cyber security and how your background makes you the perfect fit for the Detection & Response Engineer role. Let us know what excites you about working with us at StudySmarter.
Showcase Your Problem-Solving Skills: In your application, highlight specific examples where you've tackled complex problems in SOC environments. We love candidates who can demonstrate their analytical mindset and detail-oriented approach, so share those success stories!
Apply Through Our Website: We encourage you to apply directly through our website for a smoother process. It helps us keep track of applications better and ensures you don’t miss out on any important updates from us. Plus, it’s super easy!
How to prepare for a job interview at Next Ventures
✨Know Your SIEM Inside Out
Make sure you’re well-versed in Google SecOps and Splunk SIEM platforms. Brush up on your experience with onboarding log sources and tuning detections, as these are crucial for the role. Be ready to discuss specific examples of how you've improved detection coverage or reduced response times in your previous roles.
✨Showcase Your Problem-Solving Skills
Prepare to demonstrate your analytical mindset by discussing past challenges you've faced in SOC environments. Think of scenarios where you had to troubleshoot issues or optimise processes, and be ready to explain your thought process and the outcomes.
✨Familiarise Yourself with MITRE ATT&CK
Since aligning detections with frameworks like MITRE ATT&CK is part of the job, make sure you understand its structure and how it applies to threat detection. You could even bring a few examples of how you’ve used this framework in your work to the interview.
✨Communicate Clearly and Collaboratively
As collaboration with SOC analysts and incident responders is key, practice articulating your thoughts clearly. Prepare to discuss how you’ve worked with teams in the past to improve workflows or develop playbooks, highlighting your communication skills and teamwork.