SOC Engineer – SIEM & SOAR

{ “@context”: “http://schema.org”, “@type”: “JobPosting”, “title”: “SOC Engineer – SIEM & SOAR”, “description”: “

Location: London

Career Level: Specialist

Salary: Competitive salary and package dependent on experience

Role Description: Responsible for the configuration, optimisation, and integration of SIEM and SOAR platforms – Splunk Enterprise Security and SOAR. The role focuses on ensuring the platforms are stable, scalable, and effectively supporting detection, automation, and incident response across the SOC.

Security Clearance: Any offer of employment is subject to satisfactory BPSS and the candidate being granted a level of security clearance which typically requires 10 years continuous UK address history, usually including no periods of 30 consecutive days or more spent outside of the UK, and a declaration of being a British passport holder with no dual nationality at the point of application.

Key Responsibilities

  • Configure and maintain SIEM and SOAR platforms – Splunk ES, Splunk SOAR
  • Design and implement integrations between SIEM/SOAR and security tools such as EDR, Vulnerability Management, etc.
  • Develop and maintain SOAR playbooks to automate investigation and response actions
  • Support onboarding of log sources into SIEM, ensuring proper parsing and normalisation
  • Optimise platform performance, search efficiency, and data pipelines
  • Troubleshoot issues across SIEM/SOAR (data ingestion, alerts, playbooks, integrations)
  • Work with Detection Engineers to operationalise detection use cases
  • Implement enrichment workflows (threat intel, asset context, identity data)
  • Support incident response by ensuring automation and data availability
  • Maintain documentation for integrations, playbooks, and platform configurations

Role Requirements

  • Bachelor’s degree in Cyber Security, IT, or related field (or equivalent experience)

Essential Skills and Experience

  • 4-7 years experience in SIEM, SOAR, or security engineering roles
  • Hands‑on experience with SIEM platforms (e.g. Splunk) and/or SOAR tools

Skills

  • Strong understanding of SIEM architecture and log management
  • Experience building integrations using APIs, scripts (Python, PowerShell, etc.)
  • Knowledge of automation and orchestration in security operations
  • Understanding of security tooling (EDR, IAM, network security)
  • Good troubleshooting and problem‑solving skills

Certifications (Desirable)

  • Splunk Enterprise Certified Admin
  • Splunk SOAR Automation Developer
  • Relevant vendor certifications (SIEM/SOAR/tools)

#J-18808-Ljbffr”, “datePosted”: “2026-05-10”, “hiringOrganization”: { “@type”: “Organization”, “name”: “Accenture UK & Ireland”, “sameAs”: “https://uk.whatjobs.com/pub_api__cpl__428783137__4861?utm_campaign=publisher&utm_medium=api&utm_source=4861&geoID=33” }, “jobLocation”: { “@type”: “Place”, “address”: { “@type”: “PostalAddress”, “addressLocality”: “London” } } }
Company: Accenture UK & Ireland
Apply for the SOC Engineer – SIEM & SOAR
Location: London
Job Description:

Location: London

Career Level: Specialist

Salary: Competitive salary and package dependent on experience

Role Description: Responsible for the configuration, optimisation, and integration of SIEM and SOAR platforms – Splunk Enterprise Security and SOAR. The role focuses on ensuring the platforms are stable, scalable, and effectively supporting detection, automation, and incident response across the SOC.

Security Clearance: Any offer of employment is subject to satisfactory BPSS and the candidate being granted a level of security clearance which typically requires 10 years continuous UK address history, usually including no periods of 30 consecutive days or more spent outside of the UK, and a declaration of being a British passport holder with no dual nationality at the point of application.

Key Responsibilities

  • Configure and maintain SIEM and SOAR platforms – Splunk ES, Splunk SOAR
  • Design and implement integrations between SIEM/SOAR and security tools such as EDR, Vulnerability Management, etc.
  • Develop and maintain SOAR playbooks to automate investigation and response actions
  • Support onboarding of log sources into SIEM, ensuring proper parsing and normalisation
  • Optimise platform performance, search efficiency, and data pipelines
  • Troubleshoot issues across SIEM/SOAR (data ingestion, alerts, playbooks, integrations)
  • Work with Detection Engineers to operationalise detection use cases
  • Implement enrichment workflows (threat intel, asset context, identity data)
  • Support incident response by ensuring automation and data availability
  • Maintain documentation for integrations, playbooks, and platform configurations

Role Requirements

  • Bachelor’s degree in Cyber Security, IT, or related field (or equivalent experience)

Essential Skills and Experience

  • 4-7 years experience in SIEM, SOAR, or security engineering roles
  • Hands‑on experience with SIEM platforms (e.g. Splunk) and/or SOAR tools

Skills

  • Strong understanding of SIEM architecture and log management
  • Experience building integrations using APIs, scripts (Python, PowerShell, etc.)
  • Knowledge of automation and orchestration in security operations
  • Understanding of security tooling (EDR, IAM, network security)
  • Good troubleshooting and problem‑solving skills

Certifications (Desirable)

  • Splunk Enterprise Certified Admin
  • Splunk SOAR Automation Developer
  • Relevant vendor certifications (SIEM/SOAR/tools)

#J-18808-Ljbffr…

Posted: May 10th, 2026