Join to apply for the Solutions Engineer - Public Sector role at Splunk 14 hours ago Be among the first 25 applicants Join to apply for the Solutions Engineer - Public Sector role at Splunk Get AI-powered advice on this job and more exclusive features. Splunk - a Cisco company, provides the Unified Security and Observability Platform. The world’s leading organisations … trust Splunk to go from insight to action fast and at scale; organisations such as McLaren, Heineken, and Tesco are turning data into action with Splunk. Join us as we pursue our innovative vision to make machine data accessible, usable and valuable to everyone. Our company is filled with people passionate about our solutions and seeking to deliver the best … experience and outcomes to our customers. At Splunk, we’re committed to our work, customers, having fun and, most importantly, to each other’s success. This is an opportunity to work at a company that is changing the way that information supports business decisions and makes the world a more digitally resilient place. Splunk seeks a highly motivated, outcome-focused More ❯
timelines and the associated pressure. Ability to quickly pick up new technologies (e.g., MASH). Desirable Skills: Experience in security compliance auditing and remediation. Knowledge of SIEM Solutions (ArcSight, Splunk, TippingPoint, Huntsman, FortiAnalyzer). Knowledge of Firewall & VPN technologies (Checkpoint, Cisco, Juniper). Knowledge of IPS vendors (SourceFire, Cisco, IBM, TrendMicro, Fortigate, F5). Knowledge of strong authentication such as More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Liberty Global
help pre-empt potential attacks. Security Architecture: Collaborate with cross-functional teams to enhance security controls and suggest improvements to our overall security architecture. Data Analysis: Leverage tools like Splunk, Elastic, and other analytical platforms to analyse diverse log sources, normalise data, and identify emerging threats across our infrastructure. Documentation & Reporting Incident Reporting: Create comprehensive incident reports, including root cause … investigations, vulnerability management, and advanced security technologies (SIEM, IDS/IPS, EDR, and firewalls). Analytical Skills: Proficiency in analysing log sources and data normalization using platforms such as Splunk, Elastic, or similar. Frameworks & Methodologies: Deep knowledge of the MITRE ATT&CK framework, Cyber Kill Chain, NIST, and related methodologies. Communication: Excellent verbal and written communication skills, with the ability … or equivalent. Cloud & Advanced Tools: Experience with cloud security monitoring and incident response tools (AWS GuardDuty, Azure Sentinel) and familiarity with sandboxing and reverse engineering tools. SIEM: Experience in SPLUNK Cloud observability platform and Crowdstrike. Global Perspective: Prior experience coordinating cross-organisational responses in a global business environment. What We Expect from You A proactive, hands-on technical approach to More ❯
to have skills: Knowledge of Workflow/Business Process Management tools Experience with front end technologies: HTML, JavaScript, Jquery, Mustcahe Templates Experience with Performance and Monitoring tools: JMeter, Kibana, Splunk, Dynatrace Experience writing Shell script Basic understanding of Python Good understanding on AWS services (EC2, ECS, EKS, API Gateway and Serverless technologies) Integration Engine tools: Apache Camel and Active MQ More ❯
to have skills: Knowledge of Workflow/Business Process Management tools Experience with front end technologies: HTML, JavaScript, Jquery, Mustcahe Templates Experience with Performance and Monitoring tools: JMeter, Kibana, Splunk, Dynatrace Experience writing Shell script Basic understanding of Python Good understanding on AWS services (EC2, ECS, EKS, API Gateway and Serverless technologies) Integration Engine tools: Apache Camel and Active MQ More ❯
to have skills: Knowledge of Workflow/Business Process Management tools Experience with front end technologies: HTML, JavaScript, Jquery, Mustcahe Templates Experience with Performance and Monitoring tools: JMeter, Kibana, Splunk, Dynatrace Experience writing Shell script Basic understanding of Python Good understanding on AWS services (EC2, ECS, EKS, API Gateway and Serverless technologies) Integration Engine tools: Apache Camel and Active MQ More ❯
to have skills: Knowledge of Workflow/Business Process Management tools Experience with front end technologies: HTML, JavaScript, Jquery, Mustcahe Templates Experience with Performance and Monitoring tools: JMeter, Kibana, Splunk, Dynatrace Experience writing Shell script Basic understanding of Python Good understanding on AWS services (EC2, ECS, EKS, API Gateway and Serverless technologies) Integration Engine tools: Apache Camel and Active MQ More ❯
Regional Sales Manager - Strategic Accounts Join to apply for the Regional Sales Manager - Strategic Accounts role at Splunk Regional Sales Manager - Strategic Accounts 14 hours ago Be among the first 25 applicants Join to apply for the Regional Sales Manager - Strategic Accounts role at Splunk Get AI-powered advice on this job and more exclusive features. Strategic Accounts Join us … usable, and valuable to everyone. We are a company filled with people who are passionate about our product and seek to deliver the best experience for our customers. At Splunk, we’re committed to our work, customers, having fun, and most importantly to each other’s success. Learn more about Splunk careers and how you can become a part of … usable, and valuable to everyone. We are a company filled with people who are passionate about our product and seek to deliver the best experience for our customers. At Splunk, we’re committed to our work, customers, having fun, and most importantly to each other’s success. Learn more about Splunk careers and how you can become a part of More ❯
for extension. You'll play a key part in upgrading and supporting their network infrastructure across European properties, using HP switches , Cisco Meraki , and industry-standard security tools like Splunk or CrowdStrike . What you’ll be doing: Deploying and supporting LAN infrastructure and transitioning networks from HP switching to Meraki . Troubleshooting, configuring, and maintaining network systems. Monitoring vulnerabilities … and assisting with remediation based on data from Splunk , CrowdStrike , or similar tools. Documenting changes, collaborating with IT stakeholders, and ensuring a smooth, secure network environment. Attending on-site training at the start and travelling occasionally for site support. What you’ll bring: 2+ years’ experience in LAN networking. Strong experience with HP switches , basic Cisco networking , and Meraki solutions … . Fluent in Spanish and English (essential). Familiarity with vulnerability tracking tools like Splunk or CrowdStrike . Confident troubleshooting skills and an ability to work independently in a remote setting. What's on offer: Remote (UK-based) with some travel for training and site support 12-month fixed-term contract, with strong potential for extension Work with a globally More ❯
in large-scale network engineering, ideally with a focus on: Layer 2 & 3 technologies (Ethernet, MPLS, CoS, QoS, IPv4/IPv6) Mixed vendor environments and tech migrations Tools like Splunk, Jira, Ansible Sharp analytical and troubleshooting skills A proactive mindset with the ability to work both independently and as part of a team Excellent communication and project planning abilities Familiarity More ❯
L3 SOC Analyst A Global Organisation requires a Contract L3 SOC Analyst to join their Incident Response team acting as an escalation point - Splunk & Defender Day Rate: £475 - £500pd IR35 Status: Inside Duration: 6 months initially Travel: 2 days a week in Berkshire This L3 SOC Analyst will have the previous following experience: Act as a lead investigator for high … containment strategies. Perform deep forensic analysis across endpoints, logs, and network traffic to uncover advanced threats. Develop and fine-tune detection rules and correlation logic in SIEM platforms (e.g., Splunk). Collaborate with engineering and threat intelligence teams to improve detection coverage and SOC workflows. Mentor and guide L1/L2 analysts, providing training, quality reviews, and escalation support. Design More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Project People
to explain complex data in simple terms; your "data story" should resonate with both leadership and non-tech stakeholders. Familiarity with reporting tools and Scripting languages such as Helix, Splunk, and Dynatrace. Accomplished report writing capability Project People is acting as an Employment Business in relation to this vacancy. #J-18808-Ljbffr More ❯
Manager will have the following previous experience: Direct end-to-end cyber incident lifecycle management for major security events -ensuring rapid coordination across business units and leveraging tools like Splunk and Defender to contain and mitigate threats Design, maintain, and continuously enhance playbooks, response frameworks, and tabletop exercises, incorporating threat intelligence and detection insights from CrowdStrike and Splunk to mature … IR readiness. Lead root cause analysis and develop actionable remediation plans; deliver executive-level reporting and trend analysis using integrated dashboards, combining insights from Splunk and Defender data sources. Serve as the primary advisor to senior leaders and cross-functional teams, guiding cyber incident communications, impact assessment, and risk mitigation strategies across the company, Operating Companies, and Joint Ventures. More ❯
SOC Analyst A Global Organisation requires a Contract L2 SOC Analyst to join their Incident Response team - Splunk, Defender Day Rate: £400 - £420pd IR35 Status: Inside Duration: 6 months initially Travel: 2 days a week in Berkshire This L2 SOC Analyst will have the previous following experience: Monitor and investigate security alerts using tools such as Splunk, Microsoft Defender, and More ❯
federated Company before Oversee day-to-day operations of Cyber Defence teams (CERT, Security Tooling, Proactive Monitoring), managing advanced incident detection, threat hunting, and forensic investigations using platforms like Splunk, Defender, and CrowdStrike Collaborate with Security Engineering and Architecture to integrate AI/ML (e.g., Microsoft Copilot) and emerging security tech for real-time response, smarter automation, and enhanced endpoint More ❯