Exciting news for Splunk Engineers! We are rapidly growing our customer base due to the increasing demand for advanced data analytics, security monitoring, and operational intelligence solutions. Are you the Splunk Engineer we need, who can own the design, documentation, and installation of security monitoring tools/platforms that will provide data to the Sopra Steria Security Operational Centre (SOC … with Security Architecture to advise on security solution design for SOC/SIEM solutions. Formulate security strategies, applying technical and management principles creatively. What you’ll bring: Proficiency in Splunk is essential. Candidates with either the Splunk Cloud Certified Admin or Splunk Enterprise Certified Admin certifications are preferred, but relevant skills and experience may suffice. Experience leading security engineering teams More ❯
solutions. Proven experience in monitoring and observability tools to proactively manage system health. Skills and Strengths: AWS (Amazon Web Services) Auto Scaling Fargate Route53 Observability tools (New Relic, DataDog, Splunk) Scripting (Ansible, Bash, Python, GO) CI/CD Primary Job Responsibilities: Design and support EC2/ECS/EKS/Fargate environments for high availability and fault tolerance. Implement advanced More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Walsh Employment
Essential Skills and Experience: Proven experience in a Security Operations Centre (SOC) environment Previous people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls , VPNs More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
scripting such as Python, Perl, Bash, PowerShell, C++. CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar. If you are interested in this role but not sure if your skills and experience are exactly what were looking for, please do apply, wed More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Essential Skills and Experience: Proven experience in a Security Operations Centre (SOC) environment Previous people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases , firewalls , VPNs More ❯
Social network you want to login/join with: We’re looking for an experienced SOC Shift Lead to join our on-site team in Hemel Hempstead. In this role, you’ll lead a team of Security Operations Centre (SOC More ❯
SOC Expertise: Proven experience in Security Operations Centres with hands–on threat analysis.? Leadership: Strong people management skills to mentor and develop teams.? Tech Savvy: Knowledge of Microsoft Sentinel, Splunk, and security frameworks like MITRE ATT&CK .? Networking & Security: Strong understanding of TCP/IP, firewalls, VPNs, and enterprise security tools . Bonus Points for: ? DV Clearance (or eligibility More ❯
best practices For the SOC role you will have: Hands-on experience working in a Security Operations Centre (SOC) Solid knowledge of SIEM tools such as Microsoft Sentinel or Splunk Familiarity with the MITRE ATT&CK framework and threat detection methodologies Strong analytical skills with a keen eye for detail in log analysis and network monitoring Basic understanding of enterprise More ❯
a Security Operations Centre (SOC) environment Experience working as a SOC Level 2 Previous people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis In-depth understanding of: Client-server applications and multi-tier web environments Relational databases, firewalls, VPNs More ❯
in fast-paced, high-tech environments. This is a fantastic opportunity to support multiple high-profile clients across enterprise-scale environments while using industry-leading tools like Microsoft Sentinel, Splunk, and MISP. If you're ready to lead from the front, contribute to national security, and grow your cybersecurity career—this is the role for you. Responsibilities: Monitor, triage, and More ❯
a Security Operations Centre (SOC) environment Experience working as a SOC Level 2 Previous people management or line management experience Strong familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the Mitre Att&ck Framework for detection and threat analysis In-depth understanding of: Client Server applications and multi-tier web environments Relational databases, Firewalls, VPNs More ❯
proven experience working in a busy SOC with a tech-first approach and be able to lead from the front. From a technical perspective we are using Microsoft Sentinel, Splunk and MISP Threat sharing so any knowledge of these technologies would be a substantial benefit. This role is based out of our head office in Hemel Hempstead and will work … update security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies. What you will bring : Experience in Security Operations Centre. Demonstrable experience of Managing Microsoft Sentinel or Splunk implementations. Knowledge and experience with Mitre Att&ck Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge … FTP, POP, LDAP. It would be great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and experience are exactly what we’re looking for, please do More ❯
in fast-paced, high-tech environments. This is a fantastic opportunity to support multiple high-profile clients across enterprise-scale environments while using industry-leading tools like Microsoft Sentinel, Splunk, and MISP. If you're ready to lead from the front, contribute to national security, and grow your cybersecurity career—this is the role for you. Responsibilities: Monitor, triage, and More ❯
SOC Expertise: Proven experience in Security Operations Centres with hands-on threat analysis. Leadership: Strong people management skills to mentor and develop teams. Tech Savvy: Knowledge of Microsoft Sentinel, Splunk, and security frameworks like MITRE ATT&CK . Networking & Security: Strong understanding of TCP/IP, firewalls, VPNs, and enterprise security tools . Bonus Points for: Why Join Us? Work More ❯
for extension. You'll play a key part in upgrading and supporting their network infrastructure across European properties, using HP switches , Cisco Meraki , and industry-standard security tools like Splunk or CrowdStrike . What you’ll be doing: Deploying and supporting LAN infrastructure and transitioning networks from HP switching to Meraki . Troubleshooting, configuring, and maintaining network systems. Monitoring vulnerabilities … and assisting with remediation based on data from Splunk , CrowdStrike , or similar tools. Documenting changes, collaborating with IT stakeholders, and ensuring a smooth, secure network environment. Attending on-site training at the start and travelling occasionally for site support. What you’ll bring: 2+ years’ experience in LAN networking. Strong experience with HP switches , basic Cisco networking , and Meraki solutions … . Fluent in Spanish and English (essential). Familiarity with vulnerability tracking tools like Splunk or CrowdStrike . Confident troubleshooting skills and an ability to work independently in a remote setting. What's on offer: Remote (UK-based) with some travel for training and site support 12-month fixed-term contract, with strong potential for extension Work with a globally More ❯
security. Whether you’re an experienced analyst or an ambitious junior ready to move up, this is your opportunity to work with leading SIEM platforms like Microsoft Sentinel and Splunk in a dynamic, threat-rich environment that never stands still. What You’ll Be Doing Monitoring and triaging alerts across secure environments Investigating complex threats using logs, network traffic, and … attackers by integrating evolving threat intel What We’re Looking For Proven hands-on experience in a SOC environment Strong working knowledge of SIEM tools, especially Microsoft Sentinel or Splunk Solid understanding of core network protocols and modern security architecture DV clearance eligibility (must have lived in the UK for 10+ years) Aa a SOC analyst you’ll be on More ❯
a busy SOC with a tech-first approach. You will be joining a team on the verge of growth, expected to lead from the front. Knowledge of Microsoft Sentinel, Splunk, and MISP Threat sharing is highly beneficial. This position is based at our head office in Hemel Hempstead, working on a shift pattern of 12-hour shifts (Nights and Days … audiences and improving report content and presentation. Updating security incident documentation, including reports, analyses, and mitigation strategies. Requirements: Experience working in a Security Operations Centre. Managing Microsoft Sentinel and Splunk implementations. Knowledge of the Mitre Att&ck Framework. Understanding of client-server applications, web applications, databases, firewalls, VPNs, and AntiVirus products. Expertise in log data analysis and intrusion detection systems. More ❯
be joining is on the cusp of continued growth, so we are looking for you to lead from the front. From a technical perspective, we are using Microsoft Sentinel, Splunk, and MISP Threat sharing, so any knowledge of these technologies would be a substantial benefit. This role is based out of our head office in Hemel Hempstead and will work … security incident documentation, including incident reports, analysis findings, and recommended mitigation strategies. What you’ll bring: Experience in a Security Operations Centre. Demonstrable experience of managing Microsoft Sentinel and Splunk implementations. Knowledge and experience with the Mitre Att&ck Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical More ❯
security. Whether you’re an experienced analyst or an ambitious junior ready to move up, this is your opportunity to work with leading SIEM platforms like Microsoft Sentinel and Splunk in a dynamic, threat-rich environment that never stands still. What You’ll Be Doing Monitoring and triaging alerts across secure environments Investigating complex threats using logs, network traffic, and … attackers by integrating evolving threat intel What We’re Looking For Proven hands-on experience in a SOC environment Strong working knowledge of SIEM tools, especially Microsoft Sentinel or Splunk Solid understanding of core network protocols and modern security architecture DV clearance eligibility (must have lived in the UK for 10+ years) Aa a SOC analyst you’ll be on More ❯