Cardiff, Wales, United Kingdom Hybrid / WFH Options
Bridewell
Security Analyst - Splunk (BBBH195) Cardiff, Wales About Bridewell One of the most exciting prospects in the UK cyber security sector today, Bridewell is a leading cyber security services company specialising in protecting and transforming critical business functions for some of the world’s most trusted organisations. We are the trusted partner for operators of essential services and provide end-to … SANS GIAC, Blue Team Level 1 Must have demonstrable experience with customer and stakeholder management. Must have demonstrable experience working in a Service Provider environment. Strong experience within Splunk SIEM. Optional SANS GCIA, GCIH, CompTIA CYSA+ What’s in it for you? Our vision is to create a safe, inclusive digital world where people and organisations can thrive. Our values More ❯
London, England, United Kingdom Hybrid / WFH Options
Matchtech
Splunk Engineer/Security Architect Location: Hybrid - Remote with up to 2 days/week in Contract Duration: 9 months (192 working days) Active SC clearance required Role Overview We are seeking an experienced Splunk Engineer/Security Architect to lead strategic and tactical improvements to the SIEM and associated components across a large-scale hybrid security environment. You'll … detect and respond to cyber threats across multiple portfolios. You'll work alongside the SIEM Product Owner and CSOC teams to define and deliver architectural and engineering enhancements using Splunk SaaS and related technologies. Key Responsibilities Produce and maintain architecture diagrams, high- and low-level design documentation Lead configuration of Splunk and associated infrastructure (AWS EC2, S3, SQS, etc.) Drive … Lead integration of SOAR, Attack Analyzer, and other tooling into operational use Standardise collection tier components using Infrastructure as Code (IaC) where possible Essential Skills & Experience Strong experience in Splunk SaaS as a lead engineer and/or architect Deep understanding of SIEM Engineering & Architecture , particularly in CSOC environments Demonstrated experience leading end-to-end SIEM improvement initiatives Proven ability More ❯
also a great entry point for professionals looking to transition into cybersecurity. Key Responsibilities Design and maintain Prometheus metrics collection and PromQL queries Build, review, and optimize Grafana and Splunk dashboards using observability best practices (e.g., Four Golden Signals, RED methodology) Refine alerting rules across tools like PagerDuty, Prometheus, and Splunk to eliminate noise and identify gaps Work closely with … on-call support rota for DLP products Collaborate in a DevOps and Agile environment Required Skills and Experience Strong hands-on experience with Prometheus and PromQL Solid experience with Splunk dashboarding and queries Deep understanding of observability and monitoring principles Familiarity with SRE practices, SLO/SLIs, and error budget management Experience with PagerDuty or similar alerting/orchestration platforms More ❯
at the forefront of digital defence-leading incident response, improving detection mechanisms, and mentoring Junior Analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms (Microsoft Sentinel, Splunk) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with colleagues to enhance the overall … Security Operations Centre (SOC) environment Previous experience working as a SOC Level 2/Cyber Security Analyst Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (eg TCP/IP, VPNs, Firewalls) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att&ck framework and advanced threat More ❯
improvement of cybersecurity postures. Essential Skills and Experience: Proven experience in a Security Operations Centre (SOC) environment. Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk . Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ). Skilled in incident response and threat intelligence analysis . Familiarity with Mitre Att&ck framework … you will be at the forefront -leading incident response, improving detection mechanisms, and mentoring junior analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms ( Microsoft Sentinel , Splunk ). Leading incident response and driving improvements in detection and containment strategies. Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck . Collaborating with colleagues to enhance More ❯
at the forefront of digital defence-leading incident response, improving detection mechanisms, and mentoring Junior Analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms (Microsoft Sentinel, Splunk) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with colleagues to enhance the overall … Security Operations Centre (SOC) environment Previous experience working as a SOC Level 2/Cyber Security Analyst Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (eg TCP/IP, VPNs, Firewalls) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att&ck framework and advanced threat More ❯
postures. Essential Skills and Experience: Proven experience in a Security Operations Centre (SOC) environment SOC Level 2 Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att&ck framework and advanced threat … at the forefront of digital defence—leading incident response, improving detection mechanisms, and mentoring junior analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms ( Microsoft Sentinel , Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with colleagues to enhance the overall More ❯
Gosport, Hampshire, South East, United Kingdom Hybrid / WFH Options
Walsh Employment
improvement of cybersecurity postures. Essential Skills and Experience: Proven experience in a Security Operations Centre (SOC) environment Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att&ck framework and advanced threat … be at the forefront of digital defenceleading incident response, improving detection mechanisms, and mentoring junior analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms ( Microsoft Sentinel , Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with colleagues to enhance the overall More ❯
at the forefront of digital defence-leading incident response, improving detection mechanisms, and mentoring Junior Analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms (Microsoft Sentinel, Splunk) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with colleagues to enhance the overall … Security Operations Centre (SOC) environment Previous experience working as a SOC Level 2/Cyber Security Analyst Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (eg TCP/IP, VPNs, Firewalls) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att&ck framework and advanced threat More ❯
aspects of an information security program, including Governance Risk & Compliance, Security Operations, and Security Engineering with hands on engineering and administration of security tools, such as CrowdStrike, Qualys, and Splunk in collaboration with fellow security and IT professionals. Required Skills and Qualifications: Demonstrable experience across multiple cybersecurity domains including vulnerability management, risk management, network security, Splunk engineering, and incident response. More ❯
London, England, United Kingdom Hybrid / WFH Options
Hubspot
incidents Experience identifying/building new detection use cases Ability to collect/analyze large sets of structured/unstructured data from disparate sources Solid experience using SIEM tools (Splunk) for security investigations Experience using various security tools (EDR, web proxy, IDaaS etc) to assist with an investigation Strong networking and systems knowledge with a good understanding of macOS and … secure such systems Experience monitoring/securing AWS, GCP, or Azure cloud environments Knowledge of containerization software and how to secure them (Docker, Kubernetes, OpenStack) Experience using tools like Splunk & Snowflake Experience using automation tools like Tines & Splunk SOAR Experience conducting data analysis using tools such as R, Tableau, PowerBI, Jupyter Notebook We know the confidence gap and imposter syndrome More ❯
improvement of cybersecurity postures. Essential Skills and Experience: Proven experience in a Security Operations Centre (SOC) environment Strong hands-on expertise with SIEM tools such as Microsoft Sentinel and Splunk Solid understanding of network protocols and infrastructure (e.g. TCP/IP , VPNs , firewalls ) Skilled in incident response and threat intelligence analysis Familiarity with Mitre Att&ck framework and advanced threat … at the forefront of digital defence—leading incident response, improving detection mechanisms, and mentoring junior analysts. Your responsibilities will include: Analysing security incidents using advanced SIEM platforms ( Microsoft Sentinel , Splunk ) Leading incident response and driving improvements in detection and containment strategies Tuning and maintaining detection rules, using threat frameworks like Mitre Att&ck Collaborating with colleagues to enhance the overall More ❯
environment focused on information security. Some responsibilities of the role include monitoring for and driving the resolution of incidents utilizing methodologies such as ITIL, data analysis through tools like Splunk or Dynatrace, and interacting with both engineering teams and clients to handle requests or issues. To meet these responsibilities, the candidate should at least have working knowledge of operating systems … knowledge of core ITIL processes such as the management of incidents, changes, and problems. Should exhibit disciplined, process-driven, and results-oriented approach when providing support. Comfortable in the Splunk environment - able to analyze logs, create/modify dashboards, and utilize reporting and alerting functionality. Basic understanding of Federated IAM protocols such as SAML, OAuth, OpenID Connect, and FIDO2. Able More ❯
environment focused on information security. Some responsibilities of the role include monitoring for and driving the resolution of incidents utilizing methodologies such as ITIL, data analysis through tools like Splunk or Dynatrace, and interacting with both engineering teams and clients to handle requests or issues. To meet these responsibilities, the candidate should at least have working knowledge of operating systems … knowledge of core ITIL processes such as the management of incidents, changes, and problems. Should exhibit disciplined, process-driven, and results-oriented approach when providing support. Comfortable in the Splunk environment – able to analyze logs, create/modify dashboards, and utilize reporting and alerting functionality. Basic understanding of Federated IAM protocols such as SAML, OAuth, OpenID Connect, and FIDO2. Able More ❯
benchmarking skills (storage, network, Linux kernel) Solid experience with DevOps tooling (Terraform, Ansible, GitLab, Jenkins) Proficiency in Python, Golang, or similar languages Familiarity with monitoring/observability tools like Splunk, Prometheus, and Grafana Bonus: experience with containerization and orchestration (Docker, Kubernetes) If you're passionate about high-performance infrastructure and want to work at the intersection of research, trading, and More ❯
benchmarking skills (storage, network, Linux kernel) Solid experience with DevOps tooling (Terraform, Ansible, GitLab, Jenkins) Proficiency in Python, Golang, or similar languages Familiarity with monitoring/observability tools like Splunk, Prometheus, and Grafana Bonus: experience with containerization and orchestration (Docker, Kubernetes) If you're passionate about high-performance infrastructure and want to work at the intersection of research, trading, and More ❯
of code-fixes. Job Duties Prioritise and provide advanced troubleshooting of incidents escalated via ServiceDesk across a range of technologies: Internal software, MySQL, Instana, Loki, RabbitMQ, Linux & Windows OS, Splunk, Prometheus, Grafana. Develop clear and concise internal troubleshooting documentation to streamline incident resolution, ensuring each guide includes step-by-step instructions, common error scenarios, and solutions tailored to our systems … Platform/Service or recent relevant qualification. Previous experience and/or understanding of Windows & Linux OS. Experience with one or a number of the following monitoring tools: Instana, Splunk, Loki, Prometheus, Grafana. Experience with Database technologies such as Mysql, MongoDb or Redis and the relevant query language. Previous experience and/or understanding of cloud-based infrastructure (ideally AWS More ❯
a team Good communication skills, both written and verbal, and a professional demeanor Eligibility for SC clearance Experience working with customers or stakeholders, and familiarity with tools such as Splunk, Sentinel, AWS, Azure, networking, system administration, or data analytics, would be advantageous. Please send your CV for the detailed job description and to arrange an informal chat. This is an More ❯
both written and verbal, and professional approach Eligible for SC clearance Additionally, any experience of working with customers/stakeholders would be advantageous, as would exposure to any of Splunk, Sentinel, AWS, Azure, networking, system administration, data analytics tools. Please send CV for job description and an informal chat. Excellent opportunity to kick start your career! Seniority level Associate Employment More ❯
both written and verbal, and professional approach Eligible for SC clearance Additionally, any experience of working with customers/stakeholders would be advantageous, as would exposure to any of Splunk, Sentinel, AWS, Azure, networking, system administration, data analytics tools. Please send CV for job description and an informal chat. Excellent opportunity to kick start your career! #J-18808-Ljbffr More ❯
Linux Administrator: Manage internal and external information technology and computer systems including: RHEL/RedHat Linux Servers MySQL, MSSQL and Postgres databases. iSCSI SAN Technologies. Xenserver Clustered virtualized environment. Splunk Logserver. System monitoring. Network configuration and management. Firewall configuration and management. Microsoft AD and Remote Desktop Services (Windows 2019). Experience of scripting (Bash, Korn, C, Shell, etc). Desirable More ❯
Linux Engineer: Manage internal and external information technology and computer systems including: RHEL/RedHat Linux Servers MySQL, MSSQL and Postgres databases. iSCSI SAN Technologies. Xenserver Clustered virtualized environment. Splunk Logserver. System monitoring. Network configuration and management. Firewall configuration and management. Microsoft AD and Remote Desktop Services (Windows 2019). Experience of Scripting (Bash, Korn, C, Shell, etc). Desirable More ❯
both written and verbal, and professional approach Eligible for SC clearance Additionally, any experience of working with customers/stakeholders would be advantageous, as would exposure to any of Splunk, Sentinel, AWS, Azure, networking, system administration, data analytics tools. Please send CV for job description and an informal chat. Excellent opportunity to kick start your career! #J-18808-Ljbffr More ❯