Recorded Future logoRecorded Future logo

Security Engineer - Splunk

Recorded FutureLondon, UK
On-site Full-time

Clicking Apply Now takes you to AutoApply where you can tailor your resume and apply.


Experience Level

Experience

Qualifications

Qualifications:Minimum of 3 years of experience with the deployment, configuration, and troubleshooting of SIEM appliances, particularly Splunk. Experience working within a CSIRT or SOC environment is preferred. Familiarity with Cribl is a plus. Proficient in managing distributed Splunk cluster infrastructure and its components. Experience administering a Splunk environment, including search heads, indexers, deployers, deployment servers, universal forwarders, and Splunk IT Service Intelligence. Strong knowledge of Splunk SPL and visualizations for identifying anomalies and trends. Ability to onboard new data sources into SIEMs/Splunk effectively. Proficient in scripting languages such as Perl, Bash, or Python to develop custom code as needed. Capable of translating large datasets into actionable insights for the security team and leadership. Excellent problem-solving and analytical skills. Strong time management and organizational abilities. Willingness to travel up to 10% of the time.

About the job

Join Recorded Future, the world's leading intelligence company, with over 1,000 professionals servicing more than 1,900 clients globally!

We are actively seeking a dedicated Security Engineer to enhance our Enterprise Security team within the overall Security organization at Recorded Future. This role focuses on optimizing and maintaining our security stack, with a strong emphasis on the Splunk environment. We value innovative thinkers who can devise creative solutions to engineering challenges, thereby empowering our security team to effectively manage enterprise-wide security.

Key Responsibilities:

  • Deploy and configure the Splunk environment to assist our internal security team in managing security threats and risks efficiently.
  • Collaborate cross-functionally with tech stack owners to configure and maintain security-centric tools, including ELK, IAM tools, and DLP technologies.
  • Architect, build, and enhance existing solutions to address complex challenges.
  • Create dashboards, design data models, and analyze security logs to ensure the security of the Recorded Future enterprise.

Qualifications:

  • Minimum of 3 years of experience with the deployment, configuration, and troubleshooting of SIEM appliances, particularly Splunk.
  • Experience working within a CSIRT or SOC environment is preferred.
  • Familiarity with Cribl is a plus.
  • Proficient in managing distributed Splunk cluster infrastructure and its components.
  • Experience administering a Splunk environment, including search heads, indexers, deployers, deployment servers, universal forwarders, and Splunk IT Service Intelligence.
  • Strong knowledge of Splunk SPL and visualizations for identifying anomalies and trends.
  • Ability to onboard new data sources into SIEMs/Splunk effectively.
  • Proficient in scripting languages such as Perl, Bash, or Python to develop custom code as needed.
  • Capable of translating large datasets into actionable insights for the security team and leadership.
  • Excellent problem-solving and analytical skills.
  • Strong time management and organizational abilities.
  • Willingness to travel up to 10% of the time.

About Recorded Future

Recorded Future is the world's largest and most advanced intelligence company, boasting over 1,000 intelligence professionals dedicated to serving a diverse global clientele exceeding 1,900 clients.

Similar jobs

Browse all companies, explore by city & role, or SEO search pages. View directory listings: all jobs, search results, location & role pages.

Tailoring 0 resumes

We'll move completed jobs to Ready to Apply automatically.