Job Title: Senior Splunk Consultant Experience Required: 10+ Years Certification: Splunk Consultant-Level Certification Job Summary: We are looking for a highly experienced Splunk Consultant with over 10 years of expertise in designing, deploying, and managing large-scale Splunk environments. The ideal candidate should possess consultant-level certifications and be proficient in delivering end-to-end Splunk solutions for enterprise … clients. This role involves client interaction, architecture planning, implementation, optimization, and mentoring junior engineers. Key Responsibilities: Lead the architecture, design, deployment, and configuration of Splunk Enterprise and Splunk Cloud environments. Define data onboarding strategy and configure complex parsing and indexing solutions. Develop custom dashboards, alerts, reports, and visualizations using SPL. Work closely with cybersecurity, operations, and application teams to integrate … correlate data sources. Perform capacity planning, health checks, performance tuning, and upgrades. Create and maintain documentation, including SOPs, architecture diagrams, and deployment guides. Act as a trusted advisor for Splunk best practices, licensing, and scaling strategies. Train and mentor junior team members and client staff on Splunk usage and management. Assist with security monitoring, incident detection, and compliance initiatives (eg More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
fortice
Engineer to join them on a major government project that's based in in Wokingham. Role Description: - SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. - Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. - Incident Response - Work with security teams to analyze and mitigate security incidents. - Custom Rule Creation - Develop More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
Location: Wokingham, Hybrid 2 days onsite Rate: Clearance required: Active SC is essential Role purpose/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. Incident Response - Work with security teams to analyze and mitigate security incidents. Custom Rule Creation - Develop More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
p/d Via Umbrella inside IR35 Clearance required: Active SC is essential Role purpose/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. Incident Response - Work with security teams to analyze and mitigate security incidents. Custom Rule Creation - Develop More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Experis
p/d Via Umbrella inside IR35 Clearance required: Active SC is essential Role purpose/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. Incident Response - Work with security teams to analyze and mitigate security incidents. Custom Rule Creation - Develop More ❯
Wokingham, Berkshire, South East, United Kingdom Hybrid / WFH Options
Experis
p/d Via Umbrella inside IR35 Clearance required: Active SC is essential Role purpose/summary SIEM Deployment & Management - Set up, configure, and maintain SIEM tools like ArcSight, Splunk, or QRadar. Threat Detection & Analysis - Monitor security logs, detect anomalies, and investigate potential threats. Incident Response - Work with security teams to analyze and mitigate security incidents. Custom Rule Creation - Develop More ❯
Hybrid - 3 days onsite per week Clearance: Active SC Clearance is essential Rate: £550 per day - PAYE via Umbrella Only Key Responsibilities: SIEM Engineering and Architecture skills, specifically in Splunk SaaS. End to end experience of the delivery lifecycle experience for improvements. Splunk SaaS experience and expertise as a lead architect and/or engineer Experience of defining improvements within More ❯
L3 SOC Analyst A Global Organisation requires a Contract L3 SOC Analyst to join their Incident Response team acting as an escalaton point - Splunk & Defender Day Rate: £475 - £500pd IR35 Status: Inside Duration: 6 months initially Travel: 2 days a week in Berkshire This L3 SOC Analyst will have the previous following experience: Act as a lead investigator for high … containment strategies. Perform deep forensic analysis across endpoints, logs, and network traffic to uncover advanced threats. Develop and fine-tune detection rules and correlation logic in SIEM platforms (e.g., Splunk). Collaborate with engineering and threat intelligence teams to improve detection coverage and SOC workflows. Mentor and guide L1/L2 analysts, providing training, quality reviews, and escalation support. Design More ❯
SOC Analyst A Global Organisation requires a Contract L2 SOC Analyst to join their Incident Response team - Splunk, Defender Day Rate: £400 - £420pd IR35 Status: Inside Duration: 6 months initially Travel: 2 days a week in Berkshire This L2 SOC Analyst will have the previous following experience: Monitor and investigate security alerts using tools such as Splunk, Microsoft Defender, and More ❯
Manager will have the following previous experience: Direct end-to-end cyber incident lifecycle management for major security events -ensuring rapid coordination across business units and leveraging tools like Splunk and Defender to contain and mitigate threats Design, maintain, and continuously enhance playbooks, response frameworks, and tabletop exercises, incorporating threat intelligence and detection insights from CrowdStrike and Splunk to mature … IR readiness. Lead root cause analysis and develop actionable remediation plans; deliver executive-level reporting and trend analysis using integrated dashboards, combining insights from Splunk and Defender data sources. Serve as the primary advisor to senior leaders and cross-functional teams, guiding cyber incident communications, impact assessment, and risk mitigation strategies across the company, Operating Companies, and Joint Ventures. More ❯