Splunk Engineer security cleared
other jobs SR
Added before 2 Days
- England,London
- full-time
- Salary negotiable
Job Description:
Splunk Engineer - SC Cleared
Hybrid | 2 days p/w London | Start December | 3 month initial | Inside IR35
SR2 is recruiting a skilled Splunk Engineer to lead the design, development, and deployment of an advanced monitoring solution within our client’s Security Operations Centre (SOC). This role is pivotal in enhancing and augmenting an existing Splunk monitoring framework by developing a robust set of tailored use cases. To apply, you must already have active security clearance (SC); unfortunately, the client cannot put you through this if you do not already have it.
Key Responsibilities:
*Design, develop, deploy, and test innovative Splunk monitoring use cases to support SOC operations.
*Engineer Splunk alerts and dashboards, ensuring alignment with operational and security needs.
*Import and configure data from diverse sources into Splunk indexes, optimising integration and data flow.
*Create and refine correlation searches using Splunk Processing Language (SPL) to deliver actionable insights.
Key Skills & Experience:
*Demonstrable expertise in designing and implementing Splunk monitoring alerts and dashboards in a SOC environment.
*Strong proficiency with Splunk Processing Language (SPL) for developing correlation searches.
*Proven experience in integrating and importing data from various sources into Splunk.
*A collaborative approach to working within multidisciplinary teams to achieve client goals.
This is an exciting opportunity to bring your expertise to a high-impact project, driving innovation and ensuring the effectiveness of a leading-edge SOC.
Please apply with a copy of your CV and Emma from SR2 will contact you regarding next steps.
Hybrid | 2 days p/w London | Start December | 3 month initial | Inside IR35
SR2 is recruiting a skilled Splunk Engineer to lead the design, development, and deployment of an advanced monitoring solution within our client’s Security Operations Centre (SOC). This role is pivotal in enhancing and augmenting an existing Splunk monitoring framework by developing a robust set of tailored use cases. To apply, you must already have active security clearance (SC); unfortunately, the client cannot put you through this if you do not already have it.
Key Responsibilities:
*Design, develop, deploy, and test innovative Splunk monitoring use cases to support SOC operations.
*Engineer Splunk alerts and dashboards, ensuring alignment with operational and security needs.
*Import and configure data from diverse sources into Splunk indexes, optimising integration and data flow.
*Create and refine correlation searches using Splunk Processing Language (SPL) to deliver actionable insights.
Key Skills & Experience:
*Demonstrable expertise in designing and implementing Splunk monitoring alerts and dashboards in a SOC environment.
*Strong proficiency with Splunk Processing Language (SPL) for developing correlation searches.
*Proven experience in integrating and importing data from various sources into Splunk.
*A collaborative approach to working within multidisciplinary teams to achieve client goals.
This is an exciting opportunity to bring your expertise to a high-impact project, driving innovation and ensuring the effectiveness of a leading-edge SOC.
Please apply with a copy of your CV and Emma from SR2 will contact you regarding next steps.
Job number 1709680
metapel
Company Details:
SR
Ever heard of a company founded because of a book about giving back? You have now. The rousing ?People Over Profit? by Dale Partridge is why we exist....