SonicJobs Logo
Left arrow iconBack to search

Splunk Engineer (security cleared)

SR2
Posted 6 hours ago, valid for 11 days
Location

London, Greater London SW1A2DX, England

Salary

£48,000 - £57,600 per annum

info
Contract type

Full Time

By applying, a CV-Library account will be created for you. CV-Library's Terms & Conditions and Privacy Policy will apply.

Sonic Summary

info
  • SR2 is seeking a skilled Splunk Engineer with active SC clearance for a hybrid role in London, starting in December.
  • The position involves leading the design, development, and deployment of an advanced monitoring solution within a Security Operations Centre (SOC).
  • Candidates should have demonstrable expertise in creating Splunk monitoring alerts and dashboards, along with strong proficiency in Splunk Processing Language (SPL).
  • The role requires proven experience in integrating data from various sources into Splunk and a collaborative approach to teamwork.
  • This is a 3-month initial contract, inside IR35, with a competitive salary, although specific salary details were not provided.

Splunk Engineer - SC Cleared

Hybrid | 2 days p/w London | Start December | 3 month initial | Inside IR35

SR2 is recruiting a skilled Splunk Engineer to lead the design, development, and deployment of an advanced monitoring solution within our client's Security Operations Centre (SOC). This role is pivotal in enhancing and augmenting an existing Splunk monitoring framework by developing a robust set of tailored use cases. To apply, you must already have active security clearance (SC); unfortunately, the client cannot put you through this if you do not already have it.

Key Responsibilities:

  • Design, develop, deploy, and test innovative Splunk monitoring use cases to support SOC operations.
  • Engineer Splunk alerts and dashboards, ensuring alignment with operational and security needs.
  • Import and configure data from diverse sources into Splunk indexes, optimising integration and data flow.
  • Create and refine correlation searches using Splunk Processing Language (SPL) to deliver actionable insights.

Key Skills & Experience:

  • Demonstrable expertise in designing and implementing Splunk monitoring alerts and dashboards in a SOC environment.
  • Strong proficiency with Splunk Processing Language (SPL) for developing correlation searches.
  • Proven experience in integrating and importing data from various sources into Splunk.
  • A collaborative approach to working within multidisciplinary teams to achieve client goals.

This is an exciting opportunity to bring your expertise to a high-impact project, driving innovation and ensuring the effectiveness of a leading-edge SOC.

Please apply with a copy of your CV and Emma from SR2 will contact you regarding next steps.

Apply now in a few quick clicks

By applying, a CV-Library account will be created for you. CV-Library's Terms & Conditions and Privacy Policy will apply.