At a Glance
- Tasks: Enhance security operations and develop playbooks for threat detection.
- Company: Join NTT Data, a global leader in IT and cybersecurity solutions.
- Benefits: Enjoy competitive salary, inclusive culture, and opportunities for professional growth.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge technologies.
- Qualifications: Experience with SIEM platforms and strong analytical skills required.
- Other info: Dynamic environment with a focus on collaboration and continuous learning.
The predicted salary is between 36000 - 60000 £ per year.
We specialise in delivering cutting‑edge IT and cybersecurity solutions to our diverse client base. We provide expert‑managed services to help clients protect their data, comply with regulations, and manage evolving cyber threats. We are looking for a skilled Information Security Manager to join our team and be billed out to a key client to enhance their information security posture.
Responsibilities
- Enhance security operations capabilities and build sophisticated detection and response strategies.
- SIEM Engineering & Management: Deploy, configure, and maintain SIEM platforms such as Splunk, IBM QRadar, Microsoft Defender, Microsoft Sentinel, and Google Chronicle.
- Onboard and normalize log sources across cloud and on‑prem environments.
- Develop and optimise analytical rules for threat detection, anomaly detection, and behavioural analysis.
- Playbook Development & Automation: Design and implement incident response playbooks for various threat scenarios, integrate playbooks with SOAR platforms, and continuously refine playbooks based on threat intelligence and incident feedback.
- Threat Detection & Response: Monitor and analyse security alerts and events to identify potential threats, perform in‑depth investigations, coordinate incident response activities, and collaborate with threat intelligence teams to enrich detection logic.
- Threat Modelling & Use Case Development: Conduct threat modelling exercises using frameworks such as MITRE ATT&CK, STRIDE, or Kill Chain, translate threat models into actionable detection use cases and SIEM rules, and prioritise detection engineering efforts based on risk and business impact.
- Reporting & Collaboration: Generate reports and dashboards for stakeholders on security posture and incident trends, work closely with IT, DevOps, and compliance teams to ensure secure system configurations, provide mentorship and guidance to junior analysts and engineers, and maintain accurate documentation of security procedures and incident response plans.
- Other responsibilities: Scope and stand up new solutions, assist the pre‑sales team with requirements on new opportunities, demonstrate SOC tools to clients, and contribute continuous service improvement recommendations for change to address incidents or persistent events.
Qualifications
- Must be able to obtain SC Clearance or already hold SC clearance.
- Hands‑
#J-18808-Ljbffr
SOC Solutions Engineer - QRadar and Splunk employer: NTT DATA UK Ltd.
Contact Detail:
NTT DATA UK Ltd. Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SOC Solutions Engineer - QRadar and Splunk
✨Tip Number 1
Network like a pro! Reach out to folks in the industry, attend meetups, and connect with people on LinkedIn. You never know who might have the inside scoop on job openings or can refer you directly.
✨Tip Number 2
Show off your skills! Create a portfolio or GitHub repository showcasing your projects, especially those related to SIEM platforms like Splunk and QRadar. This gives potential employers a taste of what you can do.
✨Tip Number 3
Prepare for interviews by brushing up on common SOC scenarios and incident response strategies. Practice explaining your thought process during threat modelling and playbook development to impress the interviewers.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are proactive about their job search!
We think you need these skills to ace SOC Solutions Engineer - QRadar and Splunk
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the SOC Solutions Engineer role. Highlight your experience with SIEM platforms like Splunk and QRadar, and don’t forget to mention any relevant certifications. We want to see how your skills match what we’re looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about cybersecurity and how your background makes you a great fit for our team. Keep it engaging and personal – we love to see your personality come through!
Showcase Your Technical Skills: In your application, be sure to showcase your technical skills, especially around threat detection and incident response. Mention specific tools and frameworks you’ve worked with, like MITRE ATT&CK or KQL, to demonstrate your expertise. We’re keen on seeing your hands-on experience!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re proactive and eager to join our team at StudySmarter!
How to prepare for a job interview at NTT DATA UK Ltd.
✨Know Your SIEM Inside Out
Make sure you brush up on your knowledge of SIEM platforms like Splunk and IBM QRadar. Be ready to discuss your hands-on experience, including log formats and parsing. Prepare to share specific examples of how you've deployed or optimised these tools in past roles.
✨Playbook Proficiency is Key
Familiarise yourself with incident response playbooks and be prepared to discuss how you've designed or implemented them. Think about various threat scenarios you've encountered and how you automated responses using SOAR platforms. This will show your practical understanding of the role.
✨Showcase Your Analytical Skills
Be ready to demonstrate your analytical skills by discussing how you've monitored and analysed security alerts in the past. Prepare to explain your approach to threat detection and how you've collaborated with teams to enrich detection logic. Real-life examples will make your answers stand out.
✨Communication is Crucial
Since this role involves collaboration with various teams, practice articulating your thoughts clearly. Prepare to discuss how you've generated reports and dashboards for stakeholders. Highlight your interpersonal skills and any experience mentoring junior analysts, as this shows leadership potential.