Job Description
Role: SOC Engineer – SIEM & SOAR
Location: London
Salary: Competitive salary and package dependent on experience
Career Level: Specialist
Security Clearance: Any offer of employment is subject to satisfactory BPSS and the candidate being granted a level of security clearance which typically requires 10 years continuous UK address history, usually including no periods of 30 consecutive days or more spent outside of the UK, and a declaration of being a British passport holder with no dual nationalism at the point of application.
Role Description: Responsible for the configuration, optimisation, and integration of SIEM and SOAR platforms – Splunk Enterprise Security and Splunk SOAR. The role focuses on ensuring the platforms are stable, scalable, and effectively supporting detection, automation, and incident response across the SOC.
Key Responsibilities
- Configure and maintain SIEM and SOAR platforms – Splunk ES, Splunk SOAR
- Design and implement integrations between SIEM/SOAR and security tools such as EDR, Vulnerability Management, etc.
- Develop and maintain SOAR playbooks to automate investigation and response actions
- Support onboarding of log sources into SIEM, ensuring proper parsing and normalisation
- Optimise platform performance, search efficiency, and data pipelines
- Troubleshoot issues across SIEM/SOAR (data ingestion, alerts, playbooks, integrations)
- Work with Detection Engineers to operationalise detection use cases
- Implement enrichment workflows (threat intel, asset context, identity data)
- Support incident response by ensuring automation and data availability
- Maintain documentation for integrations, playbooks, and platform configurations
Role Requirements
- Bachelor’s degree in Cyber Security, IT, or related field (or equivalent experience)
Essential Skills and Experience
- 4-7 years experience in SIEM, SOAR, or security engineering roles
- Hands‑on experience with SIEM platforms (e.g. Splunk) and/or SOAR tools
Skills
- Strong understanding of SIEM architecture and log management
- Experience building integrations using APIs, scripts (Python, PowerShell, etc.)
- Knowledge of automation and orchestration in security operations
- Understanding of security tooling (EDR, IAM, network security)
- Good troubleshooting and problem‑solving skills
Certifications (Desirable)
- Splunk Enterprise Certified Admin
- Splunk SOAR Automation Developer
- Relevant vendor certifications (SIEM/SOAR/tools)
Closing Date for Applications
01/06/2026
Equal Employment Opportunity Statement
All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law.
Job candidates will not be obligated to disclose sealed or expunged records of conviction or arrest as part of the hiring process.
Accenture is committed to providing veteran employment opportunities to our service men and women.
#J-18808-Ljbffr”, “datePosted”: “2026-04-22”, “hiringOrganization”: { “@type”: “Organization”, “name”: “WeAreTechWomen”, “sameAs”: “https://uk.whatjobs.com/pub_api__cpl__409724614__4861?utm_campaign=publisher&utm_medium=api&utm_source=4861&geoID=33” }, “jobLocation”: { “@type”: “Place”, “address”: { “@type”: “PostalAddress”, “addressLocality”: “London” } } }Job Description
Role: SOC Engineer – SIEM & SOAR
Location: London
Salary: Competitive salary and package dependent on experience
Career Level: Specialist
Security Clearance: Any offer of employment is subject to satisfactory BPSS and the candidate being granted a level of security clearance which typically requires 10 years continuous UK address history, usually including no periods of 30 consecutive days or more spent outside of the UK, and a declaration of being a British passport holder with no dual nationalism at the point of application.
Role Description: Responsible for the configuration, optimisation, and integration of SIEM and SOAR platforms – Splunk Enterprise Security and Splunk SOAR. The role focuses on ensuring the platforms are stable, scalable, and effectively supporting detection, automation, and incident response across the SOC.
Key Responsibilities
- Configure and maintain SIEM and SOAR platforms – Splunk ES, Splunk SOAR
- Design and implement integrations between SIEM/SOAR and security tools such as EDR, Vulnerability Management, etc.
- Develop and maintain SOAR playbooks to automate investigation and response actions
- Support onboarding of log sources into SIEM, ensuring proper parsing and normalisation
- Optimise platform performance, search efficiency, and data pipelines
- Troubleshoot issues across SIEM/SOAR (data ingestion, alerts, playbooks, integrations)
- Work with Detection Engineers to operationalise detection use cases
- Implement enrichment workflows (threat intel, asset context, identity data)
- Support incident response by ensuring automation and data availability
- Maintain documentation for integrations, playbooks, and platform configurations
Role Requirements
- Bachelor’s degree in Cyber Security, IT, or related field (or equivalent experience)
Essential Skills and Experience
- 4-7 years experience in SIEM, SOAR, or security engineering roles
- Hands‑on experience with SIEM platforms (e.g. Splunk) and/or SOAR tools
Skills
- Strong understanding of SIEM architecture and log management
- Experience building integrations using APIs, scripts (Python, PowerShell, etc.)
- Knowledge of automation and orchestration in security operations
- Understanding of security tooling (EDR, IAM, network security)
- Good troubleshooting and problem‑solving skills
Certifications (Desirable)
- Splunk Enterprise Certified Admin
- Splunk SOAR Automation Developer
- Relevant vendor certifications (SIEM/SOAR/tools)
Closing Date for Applications
01/06/2026
Equal Employment Opportunity Statement
All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law.
Job candidates will not be obligated to disclose sealed or expunged records of conviction or arrest as part of the hiring process.
Accenture is committed to providing veteran employment opportunities to our service men and women.
#J-18808-Ljbffr…
