CrawlJobs Logo

Splunk SIEM Engineer

barclays.co.uk Logo

Barclays

Location Icon

Location:
India , Chennai

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

Join Barclays as a Splunk SIEM Engineer role, where to improve software, utilising various engineering methodologies, that provides business, platform, and technology capabilities for our customers and colleagues. At Barclays, we don't just anticipate the future - we're creating it.

Job Responsibility:

  • Development and delivery of high-quality software solutions by using industry aligned programming languages, frameworks, and tools. Ensuring that code is scalable, maintainable, and optimized for performance
  • Cross-functional collaboration with product managers, designers, and other engineers to define software requirements, devise solution strategies, and ensure seamless integration and alignment with business objectives
  • Collaboration with peers, participate in code reviews, and promote a culture of code quality and knowledge sharing
  • Stay informed of industry technology trends and innovations and actively contribute to the organization’s technology communities to foster a culture of technical excellence and growth
  • Adherence to secure coding practices to mitigate vulnerabilities, protect sensitive data, and ensure secure software solutions
  • Implementation of effective unit testing practices to ensure proper code design, readability, and reliability.

Requirements:

  • Proficient in Splunk Enterprise Admin, development, configuration management
  • Proficient in Splunk Enterprise Security (SIEM) – administering, managing, and maintaining SIEM. Developing Use cases /correlation searches
  • Proficient in Data models
  • Hands on knowledge and understanding of Splunk Cloud
  • Hands on Microsoft Sentinel
  • Hands on CI-CD tools like Gitlab, Jenkins etc.

Nice to have:

  • Hands on Scripting language - Python, shell, PowerShell etc.
  • Proficiency in administering, managing Cribl stream
  • Knowledge of Azure Cloud services
  • Hands on SOAR development.
What we offer:
  • Competitive holiday allowance
  • Life assurance
  • Private medical care
  • Pension contribution
  • Onsite medical clinic
  • Wellness rooms for relaxation and meditation
  • Shuttle bus for easy commuting
  • Child care services.

Additional Information:

Job Posted:
April 10, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Splunk SIEM Engineer

Lead SIEM Engineer

Are you ready to take the lead in shaping one of the most advanced SIEM environm...
Location
Location
United Kingdom , Farnborough
Salary
Salary:
70000.00 - 75000.00 GBP / Year
thepeoplenetwork.co.uk Logo
Fynity
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong hands-on experience leading SIEM engineering projects using platforms such as Splunk, Sentinel or QRadar
  • A deep understanding of cybersecurity frameworks and best practice (NIST, ISO, CIS, PCI DSS)
  • Scripting ability in Python, PowerShell and Regex for tuning and automation
  • Excellent communication skills and the ability to collaborate across teams and projects
  • DV Clearance must be eligible and willing to obtain
Job Responsibility
Job Responsibility
  • Leading the design, development and tuning of SIEM content – rules, dashboards, alerts and reports that spot threats fast
  • Acting as the technical authority on SIEM engineering, ensuring the platform runs efficiently and delivers real value
  • Working with SOC Analysts, Threat Hunters and Architects to enhance SIEM use cases and boost detection accuracy
  • Bringing new ideas and threat intelligence to evolve the SIEM strategy and stay ahead of emerging risks
  • Mentoring junior engineers, setting standards, and helping shape the future of SIEM operations
  • Fulltime
Read More
Arrow Right

Lead SIEM Engineer

Lead SOC SIEM Engineer. Senior SOC SIEM Content Engineer to join and large expan...
Location
Location
United Kingdom , Hemel Hempstead
Salary
Salary:
70000.00 - 75000.00 GBP / Year
thepeoplenetwork.co.uk Logo
Fynity
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Solid hands-on experience with SIEM tools like Splunk, Sentinel or QRadar
  • A good grip on security best practices and standards (ISO 27001/27002, PCI DSS)
  • Familiarity with frameworks such as NIST, ISO and CIS
  • Comfortable scripting in Python, PowerShell and regex
  • The ability to work across multiple projects and still keep the detail sharp
  • Willing and able to get DV clearance
Job Responsibility
Job Responsibility
  • Building, tuning and looking after SIEM content such as rules, dashboards, and reports, making sure threats don’t get missed
  • Keeping an eye on the data, spotting issues early and helping us respond quickly
  • Working side by side with Analysts, Architects, PMs and Engineers to make sure the SIEM content hits the mark
  • Bringing the latest threat intel, vulnerabilities and attack methods into our set-up
  • Helping to shape and maintain security standards and procedures
  • Fulltime
Read More
Arrow Right

Professional Services Engineer

At Corelight, we believe that the best approach to cybersecurity risk starts wit...
Location
Location
EMEA
Salary
Salary:
Not provided
https://corelight.com/ Logo
Corelight
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years experience in a Professional Services Engineer role
  • Bachelor's degree in a technical field (or equivalent experience)
  • Strong background in cybersecurity
  • Solid verbal and written communication skills
  • Enjoy designing novel solutions
  • Understand how to scope and describe a services engagement
  • Robust problem-solving skills, the ability to learn from doing, personal accountability, and a positive and professional attitude
  • Zeek log experience and log analysis skills are required
  • Network administration, firewall configuration, and strong knowledge of TCP/IP
  • Windows/MacOS/Linux/Unix administration experience
Job Responsibility
Job Responsibility
  • Help customers improve their cybersecurity posture, with a particular focus on process optimization
  • Help investigate incidents
  • Educate on Zeek Log use, including as it relates to Corelight Suricata alerts
  • Design and implement technical solutions with ecosystem partners (packet brokers, asset managers, SOAR systems, etc.)
  • Collaboratively work with adjacent Customer Success teams to drive predicable outcomes for projects and customers
  • Implement queries and dashboards in SIEMs - Splunk, Elastic, Humio, etc.
  • Influence customers and Corelight teams and be seen as a technical expert
  • Collaborate with product management on product features/integrations
  • Work with back-end tools like Kafka and Logstash
  • Fulltime
Read More
Arrow Right

Senior Logging & Detection Engineer

We are currently seeking a Senior Logging & Detection Engineer to lead the techn...
Location
Location
Canada , Vancouver; Calgary; Toronto
Salary
Salary:
146200.00 - 197800.00 CAD / Year
clio.com Logo
Clio
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Senior-level expertise building and scaling enterprise-grade detection capabilities and security monitoring systems
  • Expert-level query language proficiency in at least two of the following: Elasticsearch/Lucene, SQL, KQL (Kusto), or SPL (Splunk), demonstrating advanced optimization techniques
  • Extensive Detection Engineering experience owning the full lifecycle of rules, alerts, and automated response workflows within a SIEM/SOAR environment
  • Advanced log analysis skills across diverse, large-scale data sources, including multi-cloud logs (AWS, Azure, GCP), network flows, and advanced security tool outputs
  • Deep dashboard and visualization expertise with tools like Kibana, Grafana, or Tableau, specifically for security metrics and executive reporting
  • Proven expertise in leading threat hunting efforts using log data to proactively identify and track sophisticated threats and anomalous behavior across the environment
  • Senior-level scripting and automation abilities (Python/Go/PowerShell), used to build custom tools, manage APIs, and drive detection automation at scale
  • Architectural experience integrating and optimizing SIEM platforms, SOAR tools, and security orchestration systems
  • Expert performance optimization skills covering query tuning, index design, data partitioning, and overall resource-efficient analytics on big data
  • Significant incident response experience providing expert-level technical analysis and forensic support during major security incidents
Job Responsibility
Job Responsibility
  • Lead the design and implementation of sophisticated, production-ready detection rules and queries across the ELK stack, security data lakes, and multi-cloud logging platforms
  • Architect and optimize complex search queries, aggregations, and analytics dashboards for high-velocity security monitoring, focusing on performance and cost efficiency
  • Design and build automated detection and response workflows (SOAR), ensuring seamless and reliable integration with critical incident response systems
  • Serve as the primary liaison with the threat intelligence team, developing and owning the framework to translate intelligence into scalable, actionable detection capabilities (e.g., MITRE ATT&CK coverage)
  • Establish and maintain a robust detection rule library, query templates, and lead the creation of security analytics playbooks for the wider team
  • Drive performance optimization and resource utilization strategies across petabyte-scale log datasets, including index design and data tiering
  • Develop and standardize custom visualizations, dashboards, and executive reporting capabilities for security stakeholders
  • Lead complex threat hunting operations, mentor junior team members on investigative techniques, and proactively refine detection logic to achieve near-zero false positive rates
  • Collaborate closely with the platform team to define the logging architecture roadmap based on future detection requirements and security observability goals
  • Proactively research emerging threats and attack patterns, translating novel techniques into strategic, forward-looking detection logic and advising security leadership
What we offer
What we offer
  • Top-tier health benefits, dental, and vision insurance
  • Hybrid work environment
  • Flexible time off policy, with an encouraged 20 days off per year
  • $2000 annual counseling benefit
  • RRSP matching and RESP contribution
  • Clioversary recognition program with special acknowledgement at 3, 5, 7, and 10 years
  • Fulltime
Read More
Arrow Right

Senior Detection Engineer

This is a detection engineering role that leverages knowledge of monitoring, ana...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.marriott.com Logo
Marriott Bonvoy
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Sciences or related field or equivalent experience/certification
  • 3+ years of collective experience in Splunk SIEM (Splunk Enterprise Security) threat detection use case development or UEBA (Exabeam) use case development for insider threat use case development
  • 5+ years of experience in security functions such as SOC, CIRT, security engineering, risk management, vulnerability management or technical infrastructure operations, administration, or systems engineering
  • scripting or programming language, including Python
  • Current information security certification such as Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP) preferred
  • offensive and defensive security certifications such as CEH, IGAC Cyber Defense, OSCP or other related certifications preferred
  • Splunk Certification, including Splunk Enterprise Security Certified Admin preferred
  • use case development experience on the Exabeam platform preferred
  • working knowledge of the NIST Cyber Security Framework and ISO/IEC 27001:2022 preferred
  • working knowledge of the MITRE ATT&CK Framework preferred
Job Responsibility
Job Responsibility
  • Lead collaboration sessions within the cyber security tower and other business units to devise security monitoring use cases
  • engage and collaborate with other security engineers and architects as needed to keep pace with the evolution of corporate infrastructure and applications and share that knowledge with peers as appropriate
  • document prospective security monitoring use cases with MITRE ATT&ACK mappings using standard templates and methodologies
  • inform and consult other cyber ops teams of required data onboarding and integrations for use case development
  • develop analytics, correlation searches, dashboards, reports and alerts within the SIEM and UEBA platforms
  • solicit feedback for pre-production security monitoring content through peer review process and user acceptance testing for tuning
  • document developed security monitoring content in a documentation registry using department standard templates and methodologies
  • manage field mapping and transmission of security monitoring alerts to the security incident response platform for SOC analyst consumption as outlined in process documentation
  • provide governance support for the content development function entailing content development standards compliance, change management approvals for SIEM or UEBA content, and lifecycle management of developed security monitoring content
  • service operational requests in queue such as analytics content performance tuning, filtering, search refinement, parsing issues
  • Fulltime
Read More
Arrow Right

Security Engineer II

The Security Engineer II is an individual contributor who will participate and m...
Location
Location
United States , Fountain Valley
Salary
Salary:
83940.00 - 120032.00 USD / Year
haeaus.com Logo
Hyundai AutoEver America
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s Degree in Computer Science, Information Systems, or related field, or equivalent experience
  • Minimum 3 years of IT relevant experience or equivalent combination of experience plus at least 1 year of experience performing Security Engineering/Planning/Operations, preferably with SIEM or vulnerability management
  • Experience in medium to complex computing environments, with advanced knowledge in security technologies and services
  • Hands-on experience with at least two or more of the following Enterprise Security Technologies: Network Intrusion Prevention/Detection
  • Virtual Private Networks
  • SSL, IPSec, and Site-to-Site
  • Enterprise-Class Stateful Inspection Firewalls
  • Network Access Controls in context to Identity Management
  • Windows Server OS & Desktop OS
  • Network Packet Inspection
Job Responsibility
Job Responsibility
  • Design, build, test, and deploy new security technologies, which include the development of the operational manual and run books
  • Provides technical security operations engineering services to support and update existing security systems and works to automate processes related to security implementations, monitoring, and enforcement
  • Investigates, recommends, evaluates, deploys, and integrates operational security tools (e.g., SIEM, vulnerability scanning) and techniques to enhance protection of corporate assets and infrastructure
  • Participate in technical risk assessments and security exposure analyses of systems, networks, and business applications
  • Analyzes network security elements and overall network security architectural designs to ensure secure and optimal system and network performance and cost-effectiveness
  • Oversees the installation, configuration, and supportive processes of security technologies
  • Participate in or lead the Incident Response activities
  • Interacts with internal and external clients on security operations requirements, identifies security processes, and develops strategies/solutions to security issues
  • Keeps fully abreast of trends and changing technologies as they relate to IT, Network Engineering, and Information Security fields
  • Lead or assist in periodic or ad-hoc security reports that provide relevant situational awareness to our senior stakeholders
  • Fulltime
Read More
Arrow Right

Cyber Security Engineer

We are looking for someone dynamic who can quickly adapt to new challenges and f...
Location
Location
Portugal , Lisbon
Salary
Salary:
Not provided
miniclip.com Logo
Miniclip
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum of 1 year of experience in SOC or similar cybersecurity role with exposure to advanced threat detection and analysis
  • Background in Computer Science, Information Technology, or a related field
  • Proficiency in SIEM platforms (e.g., Sentinel, Splunk, QRadar) and writing custom correlation rules
  • Hands-on experience conducting: Technical Software Security Risk Assessments
  • Vulnerability Assessments in web and/or mobile applications, and Physical and Wireless penetration testing
  • Document and report incidents/assessments/findings
  • Understanding of cybersecurity standards and frameworks (e.g., ISO27001, NIST, NIS2, OWASP)
  • Availability for work outside of regular hours on short notice to handle emergencies
  • A social and hard-working candidate who thrives in a team environment and is passionate about their work
  • Solid understanding of cyber security best practices and frameworks
Job Responsibility
Job Responsibility
  • Incident handling: Identifying, triaging, and investigating potential security incidents
  • Systems Administration: Understanding system internals and implementing effective countermeasures and remediation strategies on different operating systems
  • Computer Forensic Analysis: Possessing a background in utilizing diverse forensic analysis tools during incident response investigations to assess the scope and depth of compromise
  • Vulnerability Assessment: Review and validate vulnerability reports collected by our systems working closely with cross-functional core/development teams to prioritize and facilitate the remediation of identified vulnerabilities in a timely manner
  • Reporting and documentation: Develop and maintain accurate records of all the incidents, vulnerability reports, assessments, remediation efforts, ensuring clear documentation of findings and resolutions
  • Awareness: Promote security awareness within the organization by conducting training sessions, sharing insights on emerging threats, and fostering a culture of security consciousness
  • Threat Hunting: Performing proactive threat hunting across the group
  • Physical Security: Availability to travel through our different studios to identify physical vulnerabilities and propose remediation measures
Read More
Arrow Right

Data Engineer Splunk

Location
Location
United States , North Quincy
Salary
Salary:
140000.00 USD / Year
realign-llc.com Logo
Realign
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Hands‑on experience with the Splunk platform, including dashboard creation, search queries (SPL), reports, and correlation rule development
  • Proven expertise in log analysis, event correlation, and building end‑to‑end monitoring use cases
  • Experience in operationalizing Splunk through SOPs, triage processes, runbooks, and incident response workflows
  • Strong understanding of log formats (syslog, JSON, Windows events), ingestion methods, and data onboarding best practices
  • Ability to perform incident triage, investigation, and remediation using Splunk Search Processing Language (SPL)
  • Knowledge of security monitoring concepts, SIEM architecture, detection logic, and alert tuning
  • Strong communication and documentation skills, with the ability to collaborate across SOC, IT, and Engineering teams
Job Responsibility
Job Responsibility
  • Develop, configure, and maintain Splunk dashboards, reports, alerts, and correlation searches to support security monitoring and operational visibility
  • Build and optimize log ingestion pipelines, ensuring accurate parsing, enrichment, and normalization of log data across multiple sources
  • Create and maintain SOPs, runbooks, triage workflows, and incident remediation procedures for Splunk- based monitoring operations
  • Perform alert triage, event investigation, and root‑cause analysis, leveraging Splunk queries and correlation logic
  • Continuously tune searches, dashboards, and alerts to improve detection quality and reduce noise/false positives
  • Partner with Security Operations, IT, Network, and Application teams to expand log coverage and improve monitoring use cases
  • Monitor Splunk platform health, performance, indexing, storage, and data ingestion to ensure high availability and reliability
  • Fulltime
Read More
Arrow Right