At a Glance
- Tasks: Enhance and optimise our SIEM platform while collaborating with teams to improve security.
- Company: Join a leading international law firm with a diverse and empowering culture.
- Benefits: Competitive salary, flexible work arrangements, and opportunities for professional growth.
- Other info: Work in a dynamic environment with excellent career advancement opportunities.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge technologies.
- Qualifications: Experience with SIEM platforms and strong technical skills in security.
The predicted salary is between 50000 - 60000 € per year.
We are a leading international law and professional services firm providing legal, corporate and fiduciary services to global corporations, financial institutions, capital market participants and investment fund managers. With a global presence spanning the Americas, Europe, the Middle East and Asia, we advise on the laws of Bermuda, the British Virgin Islands, the Cayman Islands, Guernsey, Ireland and Jersey.
Overview Of Role
We are seeking a highly skilled SOC Engineer to strengthen and mature our Security Information and Event Management (SIEM) platform. The successful candidate will focus on onboarding new log sources, optimising data pipelines, developing advanced detection use cases, and improving overall SOC detection and response capability. This role is ideal for a security professional with strong SIEM engineering experience and a passion for building robust, effective, and scalable security monitoring environments. The SOC Engineer will report to Information Security Operations Manager and work with the Walkers CISO group for implementing and maintaining security controls and tools. Work collaboratively with other departments to improve our security posture.
Duties, Responsibilities & Person Specification
- Enhance and optimise the existing SIEM platform to improve performance, coverage, and fidelity.
- Conduct regular assessments of SIEM architecture and propose improvements to ingestion pipelines, parsing rules, correlation logic, and storage management.
- Implement automation and orchestration components (SOAR) to streamline incident response activities.
- Identify, prioritise, and onboard new log sources from cloud, on‑prem, network, endpoint, identity, and application platforms.
- Develop and maintain custom parsers, connectors, and ingestion playbooks.
- Work with internal teams and vendors to ensure high-quality, reliable telemetry and error‑free ingestion.
- Design, implement, test, and tune detection use cases based on attacker techniques (MITRE ATT&CK), threat intelligence, and risk appetite.
- Build correlation rules, anomaly‑based detections, dashboards, and alerting workflows.
- Regularly review detection efficacy and reduce false positives through tuning and logic refinement.
- Work closely with SOC analysts to validate and refine detection logic.
- Support incident investigations through SIEM searches, enrichment, and data modelling.
- Provide technical SME support for complex incidents that require deep SIEM or log knowledge.
Documentation & Governance
- Maintain high‑quality documentation covering data models, feed onboarding, use cases, correlation logic, and architecture.
- Ensure alignment with internal controls, compliance requirements, and industry standards.
Education, Skills & Experience
Technical Expertise- Hands‑on experience with leading SIEM platforms (e.g., Exabeam, LogRhythm, ArcSight, Microsoft Sentinel, Splunk, QRadar, Elastic).
- Strong understanding of log formats (JSON, syslog, XML, CEF, etc.) and ingestion technologies (Syslog, API, Event Hubs, Kafka, Agents).
- Practical knowledge of detection engineering, threat modelling, and attacker behaviour analysis.
- Experience building and tuning correlation rules, searches, and dashboards.
- Familiarity with SOAR platforms and automation workflows.
- Strong understanding of networking, Windows/Linux systems, Cloud platforms (Azure/AWS/GCP), identity systems, and endpoint protection technologies (e.g. SentinelOne and Microsoft Defender).
- Knowledge of MITRE ATT&CK, cyber kill chain, and threat hunting methodologies.
- Level 4 or higher qualification in a computing subject, or equivalent experience.
- IT experience including both IT Infrastructure and Information Security roles.
- Relevant professional certifications that validate the fundamental skills required to perform the role, e.g. GIAC (GCIA, GCDA, GMON), Microsoft SC-200/SC-100, CompTIA Secure Infrastructure Specialist (CSIS), SSCP/CISSP etc.
- Strong skill level in scripting technologies, including Python, MS PowerShell and PowerApps.
- Ability to conduct research into Infrastructure issues and products as required.
- Self‑starting with strong interpersonal, written, and oral communication skills.
- Ability to engage colleagues at all levels and project a solid, professional attitude consistently.
- Secure Remote Access solutions.
- Network Security solutions.
- Open Source and Cyber Threat Intelligence.
- Suitable experience working with the market leading technology vendor product suites.
- Experience in software‑defined and cloud services such as SaaS, IaaS, PaaS and DaaS.
- Experience in Disaster Recovery Management and Business Continuity.
- Knowledge of applicable data privacy practices and laws.
Please be advised this role requires you to be in the office 2 days a week. Please note, this is not a day-rate contract. Walkers global is an equal opportunity employer. Equality and diversity are key to our global identity and an integral part of our goal to continue being an employer of choice. We are committed to a work environment that supports all individuals irrespective of gender, ethnicity, nationality, race, religion, marital status, age, disability, pregnancy, sexual orientation, gender identity or any other applicable legally protected characteristics. We make every effort to ensure that employment opportunities are open and accessible to all purely on the basis of personal ability.
SOC Engineer - 6 month FTC in London employer: Walkers
Walkers is an exceptional employer, offering a dynamic work culture that values diversity and empowers employees to excel in their roles. With a strong commitment to professional development, the firm provides ample opportunities for growth within the legal and financial services sectors, all while fostering a collaborative environment in the heart of London. Employees benefit from a supportive atmosphere that encourages innovation and continuous improvement, making it an ideal place for those seeking meaningful and rewarding careers.
StudySmarter Expert Advice🤫
We think this is how you could land SOC Engineer - 6 month FTC in London
✨Tip Number 1
Network like a pro! Reach out to folks in the industry, especially those already working at Walkers. A friendly chat can give you insider info and maybe even a referral!
✨Tip Number 2
Show off your skills in interviews! Prepare to discuss your experience with SIEM platforms and how you've tackled challenges in past roles. Real-life examples will make you stand out.
✨Tip Number 3
Don’t forget to ask questions during your interview! It shows you're genuinely interested in the role and helps you figure out if Walkers is the right fit for you.
✨Tip Number 4
Apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re keen on joining the team!
We think you need these skills to ace SOC Engineer - 6 month FTC in London
Some tips for your application 🫡
Tailor Your CV:Make sure your CV is tailored to the SOC Engineer role. Highlight your experience with SIEM platforms and any relevant certifications. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter:Your cover letter is your chance to shine! Use it to explain why you're passionate about information security and how you can contribute to our team. Keep it concise but impactful – we love a good story!
Show Off Your Technical Skills:Don’t hold back on showcasing your technical expertise! Mention specific tools and technologies you've worked with, especially those listed in the job description. We’re keen to see your hands-on experience!
Apply Through Our Website:We encourage you to apply through our website for a smoother process. It helps us keep track of applications and ensures you don’t miss out on any important updates from us!
How to prepare for a job interview at Walkers
✨Know Your SIEM Inside Out
Make sure you’re well-versed in the specific SIEM platforms mentioned in the job description, like Exabeam or Splunk. Brush up on your knowledge of log formats and ingestion technologies, as these will likely come up during technical discussions.
✨Showcase Your Problem-Solving Skills
Prepare to discuss past experiences where you’ve enhanced or optimised a SIEM platform. Be ready to explain how you approached challenges, what solutions you implemented, and the impact they had on security operations.
✨Understand the Legal and Financial Context
Since this role is within a legal and financial services firm, it’s crucial to understand the regulatory environment. Familiarise yourself with compliance requirements and how they relate to information security to demonstrate your fit for the company.
✨Engage with the Interviewers
Don’t just answer questions; engage with your interviewers. Ask insightful questions about their current security posture, the tools they use, and how they envision the SOC evolving. This shows your genuine interest and helps you assess if the role is right for you.