At a Glance
- Tasks: Support security operations by enhancing Splunk SIEM capabilities and developing incident response playbooks.
- Company: Join NTT Data, a global leader in Managed Services with exciting projects.
- Benefits: Competitive salary, professional development, and opportunities for growth.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge technology.
- Qualifications: 2-4 years in IT security, preferably in a SOC/NOC environment, with Splunk experience.
- Other info: Dynamic team environment with opportunities to collaborate and innovate.
The predicted salary is between 36000 - 60000 £ per year.
The Junior SOC Engineer supports the enhancement of security operations capabilities by applying technical expertise in the Splunk SIEM platform. The role involves contributing to playbook development, assisting in the creation of analytical rules, and participating in threat modelling activities. Working under general direction, the engineer helps implement and optimise detection and response processes to improve operational effectiveness.
What You’ll Be Doing
- SIEM Engineering & Management
- Assist in deploying, configuring, and maintaining Splunk SIEM platform.
- Support onboarding and normalisation of log sources across cloud and on‑prem environments.
- Contribute to the development and tuning of analytical rules for threat and anomaly detection.
- Playbook Development & Automation
- Support the creation and implementation of incident response playbooks for common threat scenarios (e.g., phishing, lateral movement).
- Assist in integrating playbooks with SOAR platforms (e.g., Microsoft Logic Apps, XSOAR) to enable automation.
- Help refine playbooks based on feedback and threat intelligence.
- Threat Detection & Response
- Monitor and review security alerts and events to identify potential threats.
- Participate in investigations and assist with incident response activities.
- Collaborate with threat intelligence teams to improve detection logic.
- Threat Modelling & Use Case Development
- Contribute to threat modelling exercises using frameworks such as MITRE ATT&CK or STRIDE.
- Assist in translating threat models into detection use cases and SIEM rules.
- Support prioritisation of detection efforts based on guidance.
- Reporting & Collaboration
- Help generate reports and dashboards on security posture and incident trends.
- Collaborate with IT, DevOps, and compliance teams to support secure system configurations.
- Share knowledge and collaborate with junior analysts and engineers.
- Maintain documentation of security procedures and incident response plans.
- Assist in preparing monthly reporting packs as required.
- Help document event and incident management processes, runbooks, and playbooks.
- Other Responsibilities
- Support scoping and implementation of new solutions for emerging opportunities.
- Assist the Pre‑Sales team with technical input on new opportunities.
- Participate in demonstrations of SOC tools to clients.
- Contribute to continual service improvement by identifying and recommending changes.
Skill Requirements
- SIEM Expertise: Hands‑on experience with Splunk.
- Technical Skills
- Strong knowledge of log formats, parsing, and normalization.
- Experience with KQL, SPL, AQL, or other SIEM query languages.
- Familiarity with scripting (Python, PowerShell) for automation and enrichment.
- Security Knowledge
- Deep understanding of threat detection, incident response, and cyber kill chain.
- Familiarity with MITRE ATT&CK, NIST, and CIS frameworks.
- Strong verbal and written English communication.
- Strong interpersonal and presentation skills.
- Strong analytical skills.
- Good understanding of network traffic flows and ability to recognise normal and suspicious activities.
- Good understanding of vulnerability scanning and management as well as ethical hacking (penetration testing).
- Knowledge of ITIL disciplines such as Incident, Problem and Change Management.
- Ability to work with minimal levels of supervision.
- Willingness to work in a job that involves 24/7 on call.
Education & Experience
- Minimum of 2 to 4 years of experience in the IT security industry, preferably working in a SOC/NOC environment.
- Preferably holds Cyber Security Certification (e.g. ISC2 CISSP, GIAC, SC‑200, Splunk Certified Admin/Power User, IBM QRadar Certified Specialist, Google Chronicle Security Engineer). Ideally with Splunk.
- Experience with ServiceNow Security suite.
- Experience with Cloud platforms (AWS and/or Microsoft Azure).
- Excellent knowledge of Microsoft Office products, especially Excel and Word.
About the Company
NTT Data is a leading Managed Service Provider (MSP) with a global reach, empowering local teams to undertake exciting projects. We offer consulting, applications, business process, cloud, and infrastructure services that enable clients to achieve great things.
#J-18808-Ljbffr
SOC Solutions Engineer employer: NTT DATA UK Ltd.
Contact Detail:
NTT DATA UK Ltd. Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Solutions Engineer
✨Tip Number 1
Network like a pro! Reach out to folks in the industry, attend meetups, and join online forums. The more connections we make, the better our chances of hearing about job openings before they even hit the market.
✨Tip Number 2
Show off your skills! Create a portfolio or GitHub repository showcasing your projects, especially those related to Splunk and SIEM. This gives potential employers a taste of what we can do and sets us apart from the crowd.
✨Tip Number 3
Prepare for interviews by practising common SOC Engineer questions and scenarios. We should also be ready to discuss our experience with threat detection and incident response. Confidence is key, so let’s nail those mock interviews!
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure our application gets seen by the right people. Plus, it shows we’re genuinely interested in joining the team at NTT Data.
We think you need these skills to ace SOC Solutions Engineer
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the SOC Solutions Engineer role. Highlight your experience with Splunk and any relevant security certifications. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about security operations and how your background makes you a great fit for our team. Keep it concise but impactful!
Show Off Your Technical Skills: Don’t forget to mention your hands-on experience with SIEM platforms and any scripting skills you have. We love seeing candidates who can demonstrate their technical expertise, especially in areas like threat detection and incident response.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, it shows us you’re serious about joining our team at StudySmarter!
How to prepare for a job interview at NTT DATA UK Ltd.
✨Know Your Splunk Inside Out
Make sure you brush up on your Splunk skills before the interview. Be ready to discuss your hands-on experience with deploying, configuring, and maintaining the Splunk SIEM platform. Prepare examples of how you've contributed to analytical rules or playbook development in past roles.
✨Understand Threat Modelling Frameworks
Familiarise yourself with threat modelling frameworks like MITRE ATT&CK or STRIDE. Be prepared to explain how you've used these frameworks in your previous work, especially in translating threat models into detection use cases and SIEM rules.
✨Showcase Your Communication Skills
Since this role involves collaboration with various teams, practice articulating your thoughts clearly. Prepare to discuss how you've generated reports or dashboards on security posture and incident trends, and be ready to share your experiences in collaborating with IT, DevOps, and compliance teams.
✨Demonstrate Your Analytical Mindset
Highlight your strong analytical skills during the interview. Be ready to discuss how you've monitored and reviewed security alerts, participated in investigations, and assisted with incident response activities. Use specific examples to illustrate your ability to identify potential threats and improve detection logic.