Responsibilities
* Design, build, and uplift SIEM architectures, including log ingestion, parsing, normalization, enrichment, and use‑case development.
* Develop, tune, and optimize detection analytics, improving signal fidelity and reducing false positives across diverse environments.
* Integrate cloud, on‑prem, and SaaS log sources (e.g., Azure, AWS, EDR, identity, network, application telemetry) into unified monitoring platforms.
* Lead SOC uplift engagements, including capability assessments, detection maturity reviews, and roadmap development.
* Build and refine automated workflows and playbooks using SOAR tooling to improve investigation and response efficiency.
* Conduct threat hunting and proactive detection exercises, aligned to MITRE ATT&CK and client threat profiles.
* Advise on operational processes, including incident response, escalation pathways, runbooks, SLAs, and KPI/OKR design.
* Develop detection engineering standards, including naming conventions, alert lifecycle, and correlation logic patterns.
* Troubleshoot complex SIEM/SOC issues, including rule misfires, ingestion failures, misconfigured integrations, and analytic gaps.
* Deliver workshops and stakeholder briefings, translating technical detection and operational insights into business‑focused recommendations.
Qualifications – Required Technical & Professional Expertise
* Hands‑on experience with major SIEM platforms, such as Microsoft Sentinel, Splunk, LogRhythm, QRadar, Elastic, or similar.
* Strong detection engineering experience, including analytic rule creation, KQL/SPL/detection logic, alert tuning, and correlation design.
* Ability to onboard and normalize log sources across cloud (Azure/AWS), identity, EDR/XDR, network, firewall, application, and SaaS systems.
* Working knowledge of MITRE ATT&CK, detection coverage mapping, and threat‑informed defence principles.
* Experience with SOAR platforms (e.g., Sentinel automation, Splunk SOAR, Cortex XSOAR, Siemplify) and building automated response playbooks.
* Understanding of EDR/XDR technologies, endpoint telemetry, and detection patterns.
* Experience with incident response processes, triage, investigation workflows, escalation paths, containment, and recovery actions.
* Ability to produce high‑quality HLDs/LLDs, runbooks, detection standards, and SOC procedures.
* Proficiency in query and scripting languages relevant to detection engineering (KQL/SPL/SQL/Python/PowerShell).
* Consulting experience, including stakeholder management, delivery ownership, and presenting operational findings.
* Eligible for UK Government security clearance; previously held SC or DV clearance is encouraged.
Qualifications – Preferred Technical & Professional Expertise
* Relevant certifications such as SC‑200, AZ‑500, GCDA, GCIA, GCIH, Splunk Enterprise Security, or vendor‑specific SIEM accreditations.
* Experience leading SOC maturity assessments or building SOC capability uplift roadmaps.
* Experience with EDR/XDR advanced features, detection logic tuning, and behavioural analytics.
* Familiarity with cloud‑native detection engines (e.g., AWS GuardDuty, Security Hub, CloudTrail analytics, GCP SCC).
* Understanding of log ingestion architectures, data retention, EPS sizing, ingestion cost optimisation, and schema standardisation.
* Exposure to threat intelligence integration, enrichment pipelines, and TI‑driven detection logic.
* Experience working in or alongside SOC L2/L3 teams, including content development and continuous improvement cycles.
* Understanding of regulatory or compliance‑driven environments, such as public sector, finance, or critical national infrastructure.
* Knowledge of Zero Trust architectures and identity‑centric detection strategies.
* Experience contributing to or overseeing SOC transitions, including outsourcing/insourcing, MSSP coordination, or tooling migration.
Benefits
* Many training opportunities from classroom to e‑learning, mentoring and coaching programs and the chance to gain industry‑recognised certifications.
* Regular and frequent promotion opportunities to ensure you can drive and develop your career with us.
* Feedback and checkpoints throughout the year.
* Diversity & Inclusion as an essential and authentic component of our culture through our policies and process as well as our Employee Champion teams and support networks.
* A culture where your ideas for growth and innovation are always welcome.
* Internal recognition programmes for peer‑to‑peer appreciation as well as from manager to employees.
* Tools and policies to support your work‑life balance from flexible working approaches, sabbatical programmes, paid paternity leave, maternity leave and an innovative maternity returners scheme.
* More traditional benefits, such as 25 days holiday (in addition to public holidays), private medical, dental & optical cover, online shopping discounts, an Employee Assistance Program, life assurance and a group personal pension plan of an additional 5% of your base salary paid by us monthly to save for your future.
Equal Employment Opportunity Statement
IBM is proud to be an equal‑opportunity employer. All qualified applicants will receive consideration for employment without regard to race, colour, religion, sex, gender, gender identity or expression, sexual orientation, national origin, genetics, pregnancy, disability, neurodivergence, age, or other characteristics protected by the applicable law. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
J-18808-Ljbffr