SonicJobs Logo
Left arrow iconBack to search

Splunk Engineer security cleared

SR2
Posted 6 hours ago, valid for 11 days
Location

London, Greater London EC1R 0WX

Salary

£80,000 - £96,000 per annum

info
Contract type

Full Time

In order to submit this application, a Reed account will be created for you. As such, in addition to applying for this job, you will be signed up to all Reed’s services as part of the process. By submitting this application, you agree to Reed’s Terms and Conditions and acknowledge that your personal data will be transferred to Reed and processed by them in accordance with their Privacy Policy.

Sonic Summary

info
  • SR2 is seeking a skilled Splunk Engineer with active SC clearance for a hybrid role based in London, starting in December.
  • The position is for an initial duration of 3 months and is classified as inside IR35.
  • Candidates should have demonstrable expertise in designing and implementing Splunk monitoring alerts and dashboards within a SOC environment.
  • The role requires strong proficiency in Splunk Processing Language (SPL) and experience in integrating data from various sources into Splunk.
  • Salary details are not specified, but the role demands significant experience in Splunk engineering.

Splunk Engineer - SC Cleared

Hybrid | 2 days p/w London | Start December | 3 month initial | Inside IR35

SR2 is recruiting a skilled Splunk Engineer to lead the design, development, and deployment of an advanced monitoring solution within our client's Security Operations Centre (SOC). This role is pivotal in enhancing and augmenting an existing Splunk monitoring framework by developing a robust set of tailored use cases. To apply, you must already have active security clearance (SC); unfortunately, the client cannot put you through this if you do not already have it.

Key Responsibilities:

  • Design, develop, deploy, and test innovative Splunk monitoring use cases to support SOC operations.
  • Engineer Splunk alerts and dashboards, ensuring alignment with operational and security needs.
  • Import and configure data from diverse sources into Splunk indexes, optimising integration and data flow.
  • Create and refine correlation searches using Splunk Processing Language (SPL) to deliver actionable insights.

Key Skills & Experience:

  • Demonstrable expertise in designing and implementing Splunk monitoring alerts and dashboards in a SOC environment.
  • Strong proficiency with Splunk Processing Language (SPL) for developing correlation searches.
  • Proven experience in integrating and importing data from various sources into Splunk.
  • A collaborative approach to working within multidisciplinary teams to achieve client goals.

This is an exciting opportunity to bring your expertise to a high-impact project, driving innovation and ensuring the effectiveness of a leading-edge SOC.

Please apply with a copy of your CV and Emma from SR2 will contact you regarding next steps.

Apply now in a few quick clicks

In order to submit this application, a Reed account will be created for you. As such, in addition to applying for this job, you will be signed up to all Reed’s services as part of the process. By submitting this application, you agree to Reed’s Terms and Conditions and acknowledge that your personal data will be transferred to Reed and processed by them in accordance with their Privacy Policy.