Your role includes BAU monitoring and log analytics incident support and change activities, leading change activities, improvement, and migration initiatives. You will apply and grow your technical expertise in Splunk and related technologies, perform analysis to understand stakeholder requirements, and deliver solutions. Additionally, you will provide on-call support for urgent incidents, triages, or maintenance activities. What you offer Experience … in monitoring and log analytics 5+ years of experience administrating, supporting and implementing solutions on Splunk Product engineering and architecture experience Knowledge of AWS Cloud technologies Proficiency in Python/Java programming Strong team player with the ability to communicate effectively across a range of stakeholders What we offer 1 wellbeing leave day per year and a minimum of More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Client Server
core systems and platforms. You will work closely with the SOC Manager across daily activities of the Security Operations Center, continuously monitoring security alerts and incidents using SIEM tools (Splunk) to create detection use cases, analyse security event data for proactive threat hunting and conduct research on the latest threats and vulnerabilities to enhance incident response readiness and capabilities. Location … You are degree educated in Cyber Security or Computer Science You have strong experience in Security Operations and Incident Response You have experience of performing analysis with SIEM technologies, Splunk preferred You have experience with proactive threat hunting using MITRE ATT&CK or similar frameworks You have a deep understanding of security appliances/tools such as host-based and … IPS, WAF, EDR You have a strong understanding of networking protocols, operating systems and cyber security technologies You have excellent communication skills CISSP, CISM, GCIA, GCIH, GCFE, GCFA, GREM, Splunk Power User and/or similar certifications is preferred What's in it for you: As a Senior Security Operations Analyst (SOC) you will receive a comprehensive package: Salary to More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Client Server Ltd
core systems and platforms. You will work closely with the SOC Manager across daily activities of the Security Operations Center, continuously monitoring security alerts and incidents using SIEM tools (Splunk) to create detection use cases, analyse security event data for proactive threat hunting and conduct research on the latest threats and vulnerabilities to enhance incident response readiness and capabilities. Location … You are degree educated in Cyber Security or Computer Science You have strong experience in Security Operations and Incident Response You have experience of performing analysis with SIEM technologies, Splunk preferred You have experience with proactive threat hunting using MITRE ATT&CK or similar frameworks You have a deep understanding of security appliances/tools such as host-based and … IPS, WAF, EDR You have a strong understanding of networking protocols, operating systems and cyber security technologies You have excellent communication skills CISSP, CISM, GCIA, GCIH, GCFE, GCFA, GREM, Splunk Power User and/or similar certifications is preferred What's in it for you: As a Senior Security Operations Analyst (SOC) you will receive a comprehensive package: Salary to More ❯
Engineer Day Rate: £500pd IR35 Status: Outside Travel: Hybrid London Duration: 6 months This SIEM Engineer will have the previous following experience: Design, implement, and manage SIEM solutions using Splunk, including data onboarding, creating correlation rules, and developing dashboards and reports to improve security visibility. Develop and maintain detection use cases, alerts, and response playbooks based on threat intelligence and … compliance requirements. Monitor, tune, and optimise Splunk performance to ensure availability, scalability, and accuracy of security event logging and analysis. Work closely with SOC analysts, incident response, and threat hunting teams to enhance threat detection, investigation capabilities, and response effectiveness. More ❯
sets. Develop and maintain critical REST API integrations , including secure connections via Salesforce Private Connect . Configure Salesforce Shield , leveraging Real-Time Event Monitoring to integrate with tools like Splunk SIEM . Translate business and architectural requirements into well-documented, production-grade code. Mentor junior developers, perform code reviews, and promote engineering best practices. Actively contribute to Agile ceremonies, including … teams (Scrum/Kanban). Desirable Skills Knowledge of Salesforce Public Sector Solution (PSS) . Experience with Salesforce Private Connect and secure network configurations. Familiarity with SIEM tools like Splunk for event monitoring and security logging. Relevant Salesforce Certifications (e.g. Platform Developer II, Service Cloud Consultant, Security & Privacy Accredited Professional). Experience delivering secure solutions for UK government or public More ❯
Are you a passionate Software Engineer looking for an exciting new challenge? Join this team and transition into maintaining and enhancing the reliability of one of the world's largest platforms. In this role, you will utilise your expertise in More ❯
Are you a seasoned Site reliability Engineer looking for an exciting new challenge? Join this team and transition into maintaining and enhancing the reliability of one of the world's largest platforms. In this role, you will utilise your expertise More ❯