for continuous improvement opportunities. Minimum Qualifications Minimum 8+ years of software development experience in Mainframe/Big Data/Java technologies. Ability to analyze Splunk logs, Java code to identify root cause and permanent solution. Demonstrated experience with Agile or other rapid application development methods. Experience with credit card payments More ❯
across their entire IT estate. You’ll help drive the vision, design and implementation of monitoring and observability systems including OpenTelemetry, Grafana, Prometheus and Splunk etc. Working side by side with DevOps teams you’ll also have the chance to work with containers and Kubernetes, OpenShift, Docker and Ansible. This … DevOps and automation tools. Requirements: Excellent previous experience in a similar Observability/Monitoring role. Experience of engineering and supporting solutions (OpenTelemetry, Grafana, Prometheus, Splunk etc) Experience with tools such as Jenkins, Ansible or Puppet Good knowledge of Linux and infrastructure support Experience of CI/CD, Cloud (AWS, GCP More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Annapurna
Site Reliability Engineer Location: London Hybrid (3 days office) Salary Range: Up to £140,000 Annapurna is working on behalf of a pioneering technology company to recruit a Site Reliability Engineer (SRE) . This is a unique opportunity to play More ❯
london, south east england, United Kingdom Hybrid / WFH Options
eTeam
Position: Splunk Architect Location: London, UK (Hybrid work ) Job Type: Contract Inside IR35 Client: Infosys Contract duration: Long term 1 year Interview mode- Virtual 2 rounds Key Responsibilities: Lead the design, implementation, and management of observability frameworks and infrastructure, ensuring robust monitoring, logging, and tracing Splunk. Oversee the automation of … Required Skills and Experience: Proven experience in a lead DevOps role with a strong focus on observability and automation. Extensive hands-on experience with Splunk and expertise in observability tools and frameworks. Demonstrated experience withFX in Treasury environments.. Proficiency in managing cloud infrastructure across major providers (AWS, Azure). Advanced More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
monitoring and response capabilities for a large-scale central government portfolio. We are seeking two experienced SOC Analysts (Level 2/3) with proven Splunk experience to join the team and help maintain the integrity, confidentiality and availability of sensitive systems and data, as well as to assist in the … in place. Essential Skills & Experience: Experience in a Level 2 or Level 3 SOC role within a government, defence, or regulated environment Hands-on Splunk experience required, ideally including Splunk Enterprise Security Splunk Core Certified Power User certification is desirable but not essential. Equivalent experience is accepted where candidates demonstrate More ❯
and incident response. Deep knowledge of IPv4/IPv6, TCP networking protocols, and the OSI model. Expertise in security tools: SIEM (ArcSight, Sentinel, QRadar, Splunk), EDR (Microsoft Defender, FireEye), IDS/IPS, firewalls, proxies, web application firewalls, and anti-virus technologies. Strong knowledge of Linux and Windows operating systems. Familiarity … with SOAR technologies (e.g., IBM Resilient, Splunk Phantom, SIEMplify) and cloud platforms (e.g., AWS, Azure, O365). Experience investigating intrusions in Linux and cloud environments. Proficiency in scripting, regular expression development, and query optimization (e.g., Kusto, SQL). If you’re ready to step up your career in a dynamic More ❯
defence-leading incident response, improving detection mechanisms, and mentoring Junior Analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms (Microsoft Sentinel, Splunk) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with … Previous experience working as a SOC Level 2/Cyber Security Analyst Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (eg TCP/IP, VPNs, Firewalls) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att More ❯
Senior Cyber Security Analyst Cheltenham £44,044 (includes £2,658 non-concessionary payment) Flexible working: We recognise the importance of a healthy work-life balance and offer full-time, part-time, and compressed hours. While hybrid working can be more More ❯
Senior Cyber Security Analyst Cheltenham £44,044 (includes £2,658 non-concessionary payment) Flexible working: We recognise the importance of a healthy work-life balance and offer full-time, part-time, and compressed hours. While hybrid working can be more More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
Bristol, Cambridge, Cardiff, Gatwick, Leeds, Manchester, Reading, St Albans Business Line Enabling Functions Date published 30-Apr-2025 18663 Connect to your Industry Deloitte Technology works at the forefront of technology development and processes to support and protect Deloitte around More ❯
Role Lead the design, deployment and tuning of enterprise-grade SIEM platforms (e.g. Splunk, Azure Sentinel etc.) Collaborate with stakeholders to define logging requirements, use cases, detection rules and dashboards Oversee integration of data sources from cloud, on-prem, endpoint, network and application layers Create and maintain detection rules, correlation … performance tuning and capacity planning Skills Expertise in SIEM design, deployment and optimisation Hands-on expertise with one or more major SIEM platforms (e.g. Splunk, Sentinel etc.) Deep understanding of log ingestion, parsing, normalisation and enrichment Strong grasp of MITRE ATT&CK framework, threat detection and alert logic Solid scripting More ❯
as well. We are seeking someone with profound SOC experience, particularly at SOC Level 2. Mastery of SIEM tools such as Microsoft Sentinel and Splunk is crucial, along with a deep understanding of network protocols and infrastructure, including TCP/IP, VPNs, and firewalls. Your expertise in incident response and … will lead incident response initiatives, refine detection mechanisms, and mentor junior analysts. Key responsibilities include: Analysing security incidents using advanced SIEM platforms (Microsoft Sentinel, Splunk) Leading incident response and fortifying detection and containment strategies Tuning and maintaining detection rules, leveraging frameworks like Mitre Att&ck Collaborating with colleagues to enhance More ❯
as well. We are seeking someone with profound SOC experience, particularly at SOC Level 2. Mastery of SIEM tools such as Microsoft Sentinel and Splunk is crucial, along with a deep understanding of network protocols and infrastructure, including TCP/IP, VPNs, and firewalls. Your expertise in incident response and … will lead incident response initiatives, refine detection mechanisms, and mentor junior analysts. Key responsibilities include: Analysing security incidents using advanced SIEM platforms (Microsoft Sentinel, Splunk) Leading incident response and fortifying detection and containment strategies Tuning and maintaining detection rules, leveraging frameworks like Mitre Att&ck Collaborating with colleagues to enhance More ❯
Skills and Experience: Proven experience in a Security Operations Centre (SOC) environment. Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk . Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ). Skilled in incident response and threat intelligence analysis . Familiarity … forefront -leading incident response, improving detection mechanisms, and mentoring junior analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms ( Microsoft Sentinel , Splunk ). Leading incident response and driving improvements in detection and containment strategies. Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck . More ❯
Proven experience in a Security Operations Centre (SOC) environment SOC Level 2 Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att … defence—leading incident response, improving detection mechanisms, and mentoring junior analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms ( Microsoft Sentinel , Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with More ❯
Gosport, Hampshire, South East, United Kingdom Hybrid / WFH Options
Walsh Employment
Skills and Experience: Proven experience in a Security Operations Centre (SOC) environment Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att … digital defenceleading incident response, improving detection mechanisms, and mentoring junior analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms ( Microsoft Sentinel , Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with More ❯
Gosport, Hampshire, South East, United Kingdom Hybrid / WFH Options
Walsh Employment
Skills and Experience: Proven experience in a Security Operations Centre (SOC) environment Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att … digital defenceleading incident response, improving detection mechanisms, and mentoring junior analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms ( Microsoft Sentinel , Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with More ❯
first approach and be able to lead from the front. This is a L2 role. From a technical perspective we are using Microsoft Sentinel, Splunk and MISP Threat sharing so any knowledge of these technologies would be a meaningful benefit. This role is based out of our office in Gosport. … response, and threat intelligence. It would be great if you had: Cyber Security certifications like CRT or OSCP. Hands-on experience with tools like Splunk or Microsoft Sentinel. If you are interested in this role but not sure if your skills and experience are exactly what were looking for, please More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
SOC environment - ideally MSSP. Experience in a technical security role are also considered. Experience with SIEM tools, such as MS Sentinel, Alien Vault or Splunk A cyber security qualifications, certification or degree e.g. CySA+, CompTIA SEC+, or similar experience. Microsoft SC-200 Certs are desirable. Excellent communication skills A strong … threat hunts, RCAs, creation of detection capabilities Monitor/hunt security alerts from security platforms (SIEM platforms, such as MS Sentinel, Alien Vault or Splunk Act on Second Line security alerts, incidents, requests, and events to ensure that threats, vulnerabilities, and breaches are managed for successful resolution. Document and manage More ❯
buckinghamshire, south east england, United Kingdom
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
SOC environment – ideally MSSP. Experience in a technical security role are also considered. Experience with SIEM tools, such as MS Sentinel, Alien Vault or Splunk A cyber security qualifications, certification or degree e.g. CySA+, CompTIA SEC+, or similar experience. Microsoft SC-200 Certs are desirable. Excellent communication skills A strong … threat hunts, RCAs, creation of detection capabilities Monitor/hunt security alerts from security platforms (SIEM platforms, such as MS Sentinel, Alien Vault or Splunk 4 days on - 4 days off - Days and Nights Act on Second Line security alerts, incidents, requests, and events to ensure that threats, vulnerabilities, and More ❯
SonarQube/Xcode Static Analyzer Hands on with Jenkins/PCF or similar tools for automated provisioning of build and test infrastructure. Troubleshooting with Splunk, API aids like Swagger/Postman and source control systems like Git Intermediate knowledge of Maven, Junit, Redis, Oracle database, SQL, Unix command, Shell scripting. … Material UI, Angular. Good knowledge of tools like Sonar, Data-dog/Dynatrace, GIT, SVN, Rally/Jira, CI (Jenkin/Bamboo)/CD, Splunk Strong communication skills -- both verbal and written – with strong relationship, collaborative skills, and organizational skills Proven experience in Agile methodology, SDLC & implementation of Projects, debugging More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
cusp of continued growth, so we are looking for you to lead from the front. From a technical perspective we are using Microsoft Sentinel, Splunk and MISP Threat sharing so any knowledge of these technologies would be a substantial benefit. This role is based out of our head office in … including incident reports, analysis findings, and recommended mitigation strategies. What youll bring: Experience in Security Operations Centre. Demonstrable experience of Managing Microsoft Sentinel and Splunk implementations. Knowledge and experience with Mitre Att&ck Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise … be great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and experience are exactly what were More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
defence-leading incident response, improving detection mechanisms, and mentoring Junior Analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms (Microsoft Sentinel, Splunk) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with … Previous experience working as a SOC Level 2/Cyber Security Analyst Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid ... More ❯