At a Glance
- Tasks: Join us as a Splunk Developer to enhance threat detection for our banking clients.
- Company: Work with a leading financial institution in vibrant cities like London, Paris, Brussels, or Amsterdam.
- Benefits: Enjoy hybrid work options, competitive rates, and opportunities for professional growth.
- Why this job: Be part of a dynamic team, tackling real-world cybersecurity challenges while developing your skills.
- Qualifications: Experience with SIEM use cases and proficiency in Splunk's search processing language (SPL) required.
- Other info: Minimum office presence of eight days per month; ideal for tech-savvy problem solvers.
The predicted salary is between 36000 - 60000 £ per year.
Duration: 1 year
Rate: 500 - 800 per day
Hybrid: 2 days onsite per week (London, Paris, Brussels or Amsterdam)
Role:
- Interact with the different customers to capture and define requirements for the development and testing of the threat detection capabilities.
- Cooperate with log source onboarding team to assure correct log source onboarding and log mapping to data models according to Splunk standard processes.
- The development and tuning and continuous improvement of correlation rules.
- Develop and maintain dashboards, reports, and alerts.
- Create Splunk Knowledge Objects to address customers' needs in context of using Splunk as a security tool.
- Prepare correlation search tests, conduct tests, and document evidence from tests that show correlation search addresses scenario described in use case.
- Responsible for the creation of procedures, high-level/low-level documentation, implementation of processes and development of staff in relation to SIEM detection logic.
- Coach a team (from a technical perspective); review work outputs and provide quality assurance.
- Analyses and identifies areas of improvement with existing processes, procedures, and documentation.
- Demonstrates how to use SIEM & Enterprise Security products to both technical/non-technical personnel.
- Provides expert technical advice and counsel in the design, monitoring and improvement of SIEM security systems.
- Prioritize and coordinate backlog of threat detection requests, making sure we have a healthy balance between defect resolution and new features.
Qualifications:
Technical Skills:
- In depth experience in development and maintenance of SIEM use cases.
- Fluent in Splunk's search processing language (SPL).
- Excellent knowledge of Splunk Enterprise and Splunk Enterprise Security.
- Sound knowledge about Splunk Common Information Model and log normalization using Data Models.
- Solid understanding of cybersecurity technologies, protocols, and applications.
- Excellent English communication skills (written and oral).
Nice to have:
- Splunk Core Certified (Advanced) Power User (crucial).
- Splunk Certified Developer (nice to have).
- Splunk Enterprise Certified Admin (nice to have).
- Splunk Enterprise Security Certified Admin (nice to have).
- Any other Security Certifications (e.g. CEH, GIAC, CISSP, OSCP).
Soft Skills:
- Strong analytical skills to evaluate sophisticated multivariate problems and find a systematic approach to gain a quick resolution, often under stress.
- Strong problem solving, documentation, process execution, time management and organizational skills.
- Ability to communicate sophisticated information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
- Fast and independent learner, with ambition to self-improve.
- At ease in a fast-changing environment, flexible and pragmatic, open-minded.
- Accurate, acting with attention to details.
- Client focus and delivery oriented.
- A team-focused mentality with ability to work & collaborate effectively in a team environment.
- Good leadership and communication skills, whether on the field, in the team or with management.
- A keen standout colleague and coordinate work among people from different areas or divisions.
- A good relationship builder with strong diplomacy skills.
- Ability to work autonomously.
Remote working:
A minimum office presence of eight days per month is required.
Splunk Developer Threat Detection Consultant employer: Salt Search
Contact Detail:
Salt Search Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Splunk Developer Threat Detection Consultant
✨Tip Number 1
Familiarise yourself with the latest trends in threat detection and SIEM technologies. Being well-versed in current cybersecurity threats and solutions will not only boost your confidence during interviews but also demonstrate your commitment to staying updated in this fast-paced field.
✨Tip Number 2
Network with professionals in the cybersecurity and Splunk communities. Attend relevant meetups, webinars, or conferences to connect with others in the industry. This can lead to valuable insights and potential referrals that could help you land the job.
✨Tip Number 3
Prepare to discuss specific examples of your experience with Splunk and threat detection. Be ready to explain how you've developed and tuned correlation rules or created dashboards in previous roles, as this practical knowledge is crucial for the position.
✨Tip Number 4
Showcase your soft skills during the interview process. Highlight your ability to work collaboratively in a team, communicate complex ideas clearly, and manage time effectively. These attributes are just as important as technical skills for a role like this.
We think you need these skills to ace Splunk Developer Threat Detection Consultant
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience with Splunk, SIEM use cases, and any relevant certifications. Use keywords from the job description to demonstrate that you meet the qualifications.
Craft a Strong Cover Letter: Write a cover letter that specifically addresses the role of Threat Detection Consultant. Mention your experience in developing and maintaining SIEM use cases and your ability to communicate complex information effectively.
Showcase Technical Skills: In your application, emphasise your proficiency in Splunk's search processing language (SPL) and your understanding of cybersecurity technologies. Provide examples of how you've used these skills in previous roles.
Highlight Soft Skills: Don't forget to mention your strong analytical skills, problem-solving abilities, and team-focused mentality. These soft skills are crucial for the role and should be evident in your application.
How to prepare for a job interview at Salt Search
✨Showcase Your Technical Skills
Be prepared to discuss your experience with Splunk, especially your proficiency in SPL and SIEM use cases. Highlight specific projects where you've developed or improved threat detection capabilities, as this will demonstrate your hands-on expertise.
✨Demonstrate Problem-Solving Abilities
Expect to face scenario-based questions that assess your analytical skills. Prepare examples of how you've tackled complex problems in previous roles, particularly in high-pressure situations, to showcase your systematic approach to resolution.
✨Communicate Clearly and Confidently
Since the role involves interacting with both technical and non-technical personnel, practice explaining complex concepts in simple terms. This will show your ability to communicate effectively across different audiences, which is crucial for the position.
✨Prepare for Team Dynamics Questions
Given the collaborative nature of the role, be ready to discuss your experiences working in teams. Share examples of how you've led or contributed to team projects, focusing on your leadership and relationship-building skills.