At a Glance
- Tasks: Support security operations by enhancing the Splunk SIEM platform and developing incident response playbooks.
- Company: Join NTT Data, a global leader in Managed Services with exciting projects.
- Benefits: Competitive salary, professional development, and opportunities for growth.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge technology.
- Qualifications: 2-4 years in IT security, preferably in a SOC/NOC environment, with Splunk experience.
- Other info: Dynamic team environment with opportunities to collaborate and innovate.
The predicted salary is between 36000 - 60000 £ per year.
The Junior SOC Engineer supports the enhancement of security operations capabilities by applying technical expertise in the Splunk SIEM platform. The role involves contributing to playbook development, assisting in the creation of analytical rules, and participating in threat modelling activities. Working under general direction, the engineer helps implement and optimise detection and response processes to improve operational effectiveness.
What You’ll Be Doing
- SIEM Engineering & Management
- Assist in deploying, configuring, and maintaining Splunk SIEM platform.
- Support onboarding and normalisation of log sources across cloud and on‑prem environments.
- Contribute to the development and tuning of analytical rules for threat and anomaly detection.
- Playbook Development & Automation
- Support the creation and implementation of incident response playbooks for common threat scenarios (e.g., phishing, lateral movement).
- Assist in integrating playbooks with SOAR platforms (e.g., Microsoft Logic Apps, XSOAR) to enable automation.
- Help refine playbooks based on feedback and threat intelligence.
- Threat Detection & Response
- Monitor and review security alerts and events to identify potential threats.
- Participate in investigations and assist with incident response activities.
- Collaborate with threat intelligence teams to improve detection logic.
- Threat Modelling & Use Case Development
- Contribute to threat modelling exercises using frameworks such as MITRE ATT&CK or STRIDE.
- Assist in translating threat models into detection use cases and SIEM rules.
- Support prioritisation of detection efforts based on guidance.
- Reporting & Collaboration
- Help generate reports and dashboards on security posture and incident trends.
- Collaborate with IT, DevOps, and compliance teams to support secure system configurations.
- Share knowledge and collaborate with junior analysts and engineers.
- Maintain documentation of security procedures and incident response plans.
- Assist in preparing monthly reporting packs as required.
- Help document event and incident management processes, runbooks, and playbooks.
- Other Responsibilities
- Support scoping and implementation of new solutions for emerging opportunities.
- Assist the Pre‑Sales team with technical input on new opportunities.
- Participate in demonstrations of SOC tools to clients.
- Contribute to continual service improvement by identifying and recommending changes.
Skill Requirements
- SIEM Expertise: Hands‑on experience with Splunk.
- Technical Skills
- Strong knowledge of log formats, parsing, and normalization.
- Experience with KQL, SPL, AQL, or other SIEM query languages.
- Familiarity with scripting (Python, PowerShell) for automation and enrichment.
- Security Knowledge
- Deep understanding of threat detection, incident response, and cyber kill chain.
- Familiarity with MITRE ATT&CK, NIST, and CIS frameworks.
- Strong verbal and written English communication.
- Strong interpersonal and presentation skills.
- Strong analytical skills.
- Good understanding of network traffic flows and ability to recognise normal and suspicious activities.
- Good understanding of vulnerability scanning and management as well as ethical hacking (penetration testing).
- Knowledge of ITIL disciplines such as Incident, Problem and Change Management.
- Ability to work with minimal levels of supervision.
- Willingness to work in a job that involves 24/7 on call.
Education & Experience
- Minimum of 2 to 4 years of experience in the IT security industry, preferably working in a SOC/NOC environment.
- Preferably holds Cyber Security Certification (e.g. ISC2 CISSP, GIAC, SC‑200, Splunk Certified Admin/Power User, IBM QRadar Certified Specialist, Google Chronicle Security Engineer). Ideally with Splunk.
- Experience with ServiceNow Security suite.
- Experience with Cloud platforms (AWS and/or Microsoft Azure).
- Excellent knowledge of Microsoft Office products, especially Excel and Word.
About the Company
NTT Data is a leading Managed Service Provider (MSP) with a global reach, empowering local teams to undertake exciting projects. We offer consulting, applications, business process, cloud, and infrastructure services that enable clients to achieve great things.
#J-18808-Ljbffr
SOC Solutions Engineer employer: NTT DATA UK Ltd.
Contact Detail:
NTT DATA UK Ltd. Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Solutions Engineer
✨Tip Number 1
Network like a pro! Reach out to folks in the industry, attend meetups, and connect with people on LinkedIn. You never know who might have the inside scoop on job openings or can refer you directly.
✨Tip Number 2
Show off your skills! Create a portfolio or GitHub repository showcasing your projects, especially those related to Splunk or threat detection. This gives potential employers a taste of what you can do beyond your CV.
✨Tip Number 3
Prepare for interviews by practising common SOC scenarios and technical questions. Brush up on your knowledge of MITRE ATT&CK and be ready to discuss how you've tackled similar challenges in the past.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are proactive about their job search!
We think you need these skills to ace SOC Solutions Engineer
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the SOC Solutions Engineer role. Highlight your experience with Splunk and any relevant security certifications. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about security operations and how your background makes you a great fit for our team. Keep it concise but impactful!
Show Off Your Technical Skills: Don’t forget to showcase your technical expertise in your application. Mention your experience with SIEM platforms, scripting languages, and any frameworks like MITRE ATT&CK. We love seeing those skills in action!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, it shows us you’re serious about joining our team!
How to prepare for a job interview at NTT DATA UK Ltd.
✨Know Your Splunk Inside Out
Make sure you brush up on your Splunk skills before the interview. Be ready to discuss your hands-on experience with deploying, configuring, and maintaining the Splunk SIEM platform. They’ll likely want to hear about specific projects where you’ve contributed to analytical rules or threat detection.
✨Familiarise Yourself with Threat Modelling
Get comfortable with frameworks like MITRE ATT&CK or STRIDE. Be prepared to explain how you've used these frameworks in past roles to develop detection use cases or improve incident response playbooks. Showing that you can translate theory into practice will impress them.
✨Show Off Your Communication Skills
Since this role involves collaboration with various teams, strong verbal and written communication is key. Practice explaining complex technical concepts in simple terms. You might be asked to present a past project or incident response scenario, so make sure you can articulate your thought process clearly.
✨Demonstrate Your Analytical Mindset
Be ready to discuss how you approach threat detection and incident response. They’ll want to know how you analyse security alerts and events. Prepare examples of how you’ve identified potential threats and what steps you took to mitigate them. This will showcase your analytical skills and proactive mindset.