solution demonstrations when required. What You’ll Bring 3–5 years’ experience in cybersecurity operations, ideally within a SOC or incident response environment. Proven expertise with QRadar (key focus), Splunk, or Microsoft Sentinel. Strong grasp of network traffic analysis, vulnerability management, and ethical hacking techniques. Solid understanding of DFIR principles and evidence handling. Knowledge of ITIL processes – Incident, Problem, and More ❯
impact SRE team focused on automation, observability, and scaling infrastructure to support millions of users. Tech Stack Highlights Java Kotlin C++ Postgres AWS (EC2, ECS, Fargate, Route53) New Relic Splunk DataDog Terraform Helm Kubernetes Microservices Wh click apply for full job details More ❯
Role Title: Splunk SRE Engineer Location: Birmingham, UK Work mode: Hybrid, 3 days working from client office Role Description: Responsible for leading and executing the migration of data, dashboards, alerts, and configurations from Splunk systems to Elasticsearch. This role involves deep technical expertise in Splunk architecture, data ingestion, and observability tools, along with strong project management and stakeholder communication skills. … Must have skills: -Splunk -ELK Stack -Kibana Nice to have skills: -stakeholder communication skills -strong project management Responsibilities: Minimum number of relevant years of experience: 5 Detailed Job Description: Ability to deploy and configure Elasticsearch, Logstash, Kibana for centralized logging/data analytics; setting up ELK clusters with high availability/optimization Proficiency in containerization using Docker and orchestration with More ❯
breaches. Perform root cause analysis and provide actionable recommendations. Conduct static and dynamic malware analysis; reverse engineer to identify IOCs. Monitor, tune, and optimise SIEM tools - particularly IBM QRadar , Splunk, and Microsoft Sentinel. Develop and refine SOC use cases, runbooks, and playbooks. Integrate emerging threat intelligence into monitoring and detection workflows. Liaise with clients, Service Delivery Managers, and technical teams … solution demonstrations when required. What You'll Bring 3-5 years' experience in cybersecurity operations, ideally within a SOC or incident response environment. Proven expertise with QRadar (key focus), Splunk, or Microsoft Sentinel. Strong grasp of network traffic analysis, vulnerability management, and ethical hacking techniques. Solid understanding of DFIR principles and evidence handling. Knowledge of ITIL processes - Incident, Problem, and More ❯