Make yourself visible and let companies apply to you.
Roles

Splunk Jobs

Overview

Looking for top Splunk jobs? Discover the latest Splunk developer, engineer, and administrator roles on Haystack – the leading IT job board. Whether you're an expert in Splunk Enterprise, data analytics, or SIEM, find your perfect career opportunity today and take your IT career to the next level!
Filters applied
Splunk
Search
Salary
Location
Remote preference
Role type
Seniority
Tech stack
Sectors
Contract type
Company size
Visa sponsorship
Systems Engineer - Grade B2
Teleperformance
Multiple locations
In office
Mid
Private salary
RECENTLY POSTED
linux
windows
window-server
splunk
microsoft-azure
Hello,
Thank you for your interested in our L2-L3 Systems Engineer position here at Teleperformance UK.
We’re looking for a self-driven and proactive Systems Engineer (Level 2–3) with a genuine passion for technology and problem-solving. This role is ideal for someone who thrives in dynamic environments, takes ownership of their work, and brings solid experience primarily with Microsoft infrastructure and cloud solutions. You’ll be part of a team that values initiative, continuous learning, and delivering robust technical solutions that support our evolving business needs.
Please note, that we are eager to get to know you even if you don’t fully “tick all the boxes” on the desired skill list below. We value a can-do attitude and desire to learn and actively participate within the team
Hours: Full-time 37.5 hours per week, Monday to Friday, office hours, although some weekend and out-of-hour work may be required to assist business needs. The successful candidate may be expected to join an on-call rota.
Contract Term: Permanent
The Role
Participate in the maintenance, monitoring, implementation and decommission of IT systems, including servers, storage and hardware; and provide professional support and knowledge of Teleperformance systems to internal business units and clients. They will submit recommendations for system improvements, including security, to IT management team and help maintain the optimal operational environment of the Teleperformance IT Systems.
O****bjectives of the role
Support and improve operational IT systems, implement new and decommission old solutions
Provide 2nd - 3rd Line support for IT systems, infrastructure and Cloud technologies
Help design new solutions, based on operational requirements
knowledge of the following IT components/Solutions: Windows Server 2016+, AD Domain Services, DHCP, DNS, Azure, GPO, VMWare, Hyper-V (desires), Exchange, M365, Email Filtering & Web Filtering (desired), MECM/TANIUM (desired), Veeam Backup, overall AV Solutions (Trend, Falcon CS), Monitoring & DEX platforms such as SolarWinds, ControlUp, Splunk, Strong Hardware proficiency (Ex: Synergy, Nimble, Brocade, Service BAU requests.
Securing systems to Cyber Essentials, PCI DSS and ISO27000 standards through audits, vulnerability scanning and remediation
Documentation, creation, update and keeping to date.
Assist in the migration from, consolidation of and/or decommission of legacy systems
The Ideal Candidate
Personal competencies
At least 3-5 years IT Systems Team / 3rd Line Infrastructure Support experience
Strong troubleshooting, analytical and support skills
Organised, efficient and able to prioritise tasks / plan own time
Strong communication skills both verbal and written
Be able to think ‘out of the box’, providing creative ideas and solutions
Team player and driven by success, aiming for quality service
Experience in a Call Centre environment or similar would be advantageous
Required skills
SC clearance / SC clearance capable is a big advantage.
Windows Server 2016+, configuration, administration and support
Hardware support, including racking / (un)racking
Microsoft Azure Services
Conditional access knowledge is desirable
Other cloud platforms are desirable
Windows Domain Services – AD Services, DHCP, DNS, Sites & Services
Experience with VMware and some Hyper-V
Other Hypervisors are desirable
Experience with MECM is desirable
Experience with Tanium is desirable
Experience with Anti-Malware solutions, e.g. Falcon CS
System Monitoring and centralized logging, e.g. SolarWinds, Splunk, ControlUp, Chronicle
Windows Terminal Server / RDS desirable
Linux administration desirable
Knowledge and experience of Role Based Access
MS Azure Associate/Expert desirable
Teleperformance is a worldwide leader in multichannel customer experience management.  We are experts in the call centre services industry and add value to our client’s service by delivering great customer service and solutions on their behalf.  We’ve been providing superior customer care for leading brands throughout the world since 1978 and every year we interact with more than 35% of the world’s population.
Cloud Devops Engineer
83zero Ltd
Multiple locations
Hybrid
Mid
£65k - £75k
RECENTLY POSTED
aws
itil
terraform
github
python
powershell
+2
Cloud DevOps Engineer (SC Cleared) - Hybrid - Manchester
Salary: £65,000 - £75,000 pa (depending on experience) plus benefits, perks and healthcare options
Location: Hybrid - Remote/1to2 x days per week - Travel to Central Manchester
Job Type: Permanent
Security Clearance: This role is exclusively open to UK sole nationals ONLY who either hold or are eligible for Security Clearance (SC).
We are on the lookout for a talented and motivated Cloud DevOps Engineers to join a dynamic Cloud Pod. The client works in focused, agile teams called Pods - groups of technical professionals who come together to build and maintain cloud platforms. If you enjoy working in a team-oriented environment and are passionate about continuous learning, we’d love to hear from you.
Your Role:
Build and maintain cloud platforms with a high degree of focus on technical reuse, standardisation and blueprints; think code first rather than “ClickOps”
Embrace modern ways of working and feel part of our customer’s outcomes as we group around activities in agile type sprints.
Continue to strengthen and bolster your existing capabilities in platform engineering through a mix of professional training, certifications, and experiences.
Your skills and experience
Experience working with cloud platforms such as AWS and Azure.
Familiarity with Scripting and resource monitoring using tools like YAML, PowerShell, JSON, or Python, with a focus on automation and reducing manual tasks.
Exposure to infrastructure-as-code tools such as CloudFormation, ARM templates, Terraform, or Bicep.
Understanding of DevOps practices and tools, including GitHub, Azure DevOps (Boards, Pipelines, Artifacts), and observability tools like Splunk.
Experience contributing to end-to-end delivery using ITIL frameworks, with a focus on collaboration and continuous improvement.
Security Clearance Requirements:
Ideally you will currently hold valid SC level Security clearance or at a minimum you must be eligible for Security Check (SC) clearance.
Applicants must have resided continuously in the UK for the past 5 years.
If you’re ready to take the next step in your career and thrive in a fast-paced, innovative environment, we want to hear from you!
Please send your CV in application to James Money -
Lead Technical Consultant - Service Operations - Dynatrace, AppDynamic
VIQU IT
London
Hybrid
Leader
£80k - £100k
RECENTLY POSTED
dynatrace
splunk
datadog
opentelemetry
Job Title: Lead Technical Consultant Service Operations - Dynatrace, AppDynamics, Datadog
Location: Hybrid (UK, with travel as required)
Type: Full-time
Do you want to be part of something special? Morela is representing a high-growth start-up redefining IT Operations, led by a serial entrepreneur with a proven track record of building successful businesses. This is your chance to join a team breaking the mold in enterprise service delivery and shaping the future of IT Operations from the ground up.
We re looking for a Lead Technical Consultant who thrives in complex enterprise environments and loves working with cutting-edge technology. You will design, implement, and optimise IT Operations solutions across observability, AIOps, and ITSM platforms, help clients adopt best practices in Event Management and OpenTelemetry, and act as a trusted technical advisor bridging technology and business strategy. You ll also help develop frameworks, accelerators, and methodologies that define how the company delivers its services.
Skills & Experience:
5+ years in IT Operations, consulting, or related technical roles
Hands-on experience with observability platforms: Dynatrace, AppDynamics, Datadog
Experience with AIOps/ITSM tools: BigPanda, Splunk ITSM, ServiceNow, or equivalent
Expertise in Event Management and OpenTelemetry
Strong knowledge of ITSM/ITIL frameworks and Enterprise Architecture principles
Proven experience delivering solutions to large enterprise clients
Ability to bridge technical delivery with business strategy, advising senior stakeholders
Excellent problem-solving, communication, and stakeholder management skills
Experience implementing and optimising IT Operations solutions across multiple technologies
Compensation & Benefits:
Base salary: £75,000 £100,000 (depending on experience)
Annual performance bonus
25 days annual leave plus bank holidays
Hybrid working with flexibility around client engagements
Opportunity to work on innovative, high-impact projects in a fast-growing start-up
If you re ready to push boundaries in IT Operations and make a tangible impact, this is the role for you.
Observability Developer/Engineer
VIQU IT
London
Hybrid
Mid
£40k - £75k
RECENTLY POSTED
prometheus
grafana
python
splunk
nodejs
jira
+2
Job Title: Observability Developer / Engineer
Location: Hybrid (UK, with travel as required)
Employment Type: Full-time
This role is with Morela please respond to (url removed) for further informaiton
Do you want to be part of something special? Morela is proud to represent our exclusive client, a fast-growing start-up transforming Service Operations. Led by industry leaders with a proven track record of building and scaling successful businesses, this company is redefining how enterprises monitor, manage, and optimise IT operations. This is your chance to join a team shaping the future of observability and operational intelligence from the ground up.
We are seeking a skilled Observability Developer to design, build, and optimise observability solutions that help enterprise clients gain actionable insights from their logs, metrics, traces, and events. In this role, you will reduce noise, improve reliability, and accelerate innovation by integrating monitoring platforms, ITSM tools, and AIOps engines while embedding observability best practices into delivery pipelines.
Key Responsibilities:
Design and implement observability pipelines across logs, metrics, events, and traces
Build integrations and automation between monitoring/alerting platforms, ITSM tools, and AIOps engines
Optimise alerting strategies to reduce noise and improve signal quality
Develop dashboards, visualisations, and reports for technical and business stakeholders
Deploy observability solutions in cloud and hybrid environments
Contribute to observability strategy and best practices within the Service Operations Framework
Collaborate with development, operations, and SRE teams to embed observability into the full delivery lifecycle
Skills & Experience:
Strong background in observability, monitoring, and event management
Hands-on experience with platforms such as Dynatrace, Datadog, AppDynamics, Splunk, Prometheus, Grafana, New Relic, or Elastic
Experience building integrations and automation using APIs, Python, Node.js, Go, or scripting
Familiarity with AIOps platforms (BigPanda, Moogsoft, etc.)
Knowledge of ITSM / incident management processes and tools (Halo ITSM, ServiceNow, Jira Service Management)
Cloud experience (AWS, Azure, GCP) and deploying observability tools in cloud-native environments
Understanding of OpenTelemetry and modern observability standards
Strong problem-solving skills and ability to work in a fast-paced start-up or consulting environment
Why Join:
Work with our exclusive client, a high-growth start-up backed by proven Service Operations leaders
Work on cutting-edge projects across multiple industries
Shape both client outcomes and the company s frameworks and offerings
Thrive in a collaborative culture where ideas are valued, careers grow quickly, and impact is immediate
Sounds great right? Don’t hesitate to apply today.
GCP Security Operations Engineer
La Fosse Associates Limited
London
Hybrid
Mid
£700/day - £750/day
RECENTLY POSTED
splunk
A Global Financial Services client requires a Contract GCP SecOps Engineer with strong hands-on expertise in Google Cloud Platform (GCP), incident response, and log source integration to join their Security Operations team.
Day Rate: £700-£750pd
IR35 Status: Outside
Duration: Initial 6 months
Travel: 2 days a week in Central London
This GCP Security Engineer will have the previous following exp:
Ingest, normalise and correlate log data from a wide range of sources, including GCP-native services (eg VPC Flow Logs, Cloud Audit Logs, Cloud DNS) and third-party systems, to support Real Time threat detection and analysis.
Build and maintain detection logic by transforming raw log data into actionable insights such as indicators of compromise (IOCs), behavioural patterns, or risk-based alerts using tools such as Google Chronicle, BigQuery, or Splunk.
Lead or support incident response investigations, working closely with SOC analysts, engineering teams, and stakeholders to contain and remediate threats effectively across complex cloud infrastructures.
Design and implement automated response workflows, leveraging GCP-native services like Cloud Functions, Pub/Sub, and Event Threat Detection to streamline alert triage and reduce mean time to response (MTTR).
Enhance visibility and detection coverage by improving log source onboarding, parsing, and enrichment pipelines ensuring critical cloud activities are captured, monitored, and aligned with compliance requirements.
GCP Security Engineer
La Fosse Associates Limited
London
Hybrid
Mid
£700/day - £750/day
RECENTLY POSTED
splunk
A Global Financial Services client requires a Contract GCP SecOps Engineer with strong hands-on expertise in Google Cloud Platform (GCP), incident response, and log source integration to join their Security Operations team.
Day Rate: £700-£750pd
IR35 Status: Outside
Duration: Initial 6 months
Travel: 2 days a week in Central London
This GCP Security Engineer will have the previous following exp:
Ingest, normalise and correlate log data from a wide range of sources, including GCP-native services (eg VPC Flow Logs, Cloud Audit Logs, Cloud DNS) and third-party systems, to support Real Time threat detection and analysis.
Build and maintain detection logic by transforming raw log data into actionable insights such as indicators of compromise (IOCs), behavioural patterns, or risk-based alerts using tools such as Google Chronicle, BigQuery, or Splunk.
Lead or support incident response investigations, working closely with SOC analysts, engineering teams, and stakeholders to contain and remediate threats effectively across complex cloud infrastructures.
Design and implement automated response workflows, leveraging GCP-native services like Cloud Functions, Pub/Sub, and Event Threat Detection to streamline alert triage and reduce mean time to response (MTTR).
Enhance visibility and detection coverage by improving log source onboarding, parsing, and enrichment pipelines ensuring critical cloud activities are captured, monitored, and aligned with compliance requirements.
Observability Developer/Engineer
VIQU Ltd
London
Hybrid
Mid
£40k - £75k
RECENTLY POSTED
prometheus
grafana
python
splunk
nodejs
jira
+2
Job Title: Observability Developer/Engineer
Location: Hybrid (UK, with travel as required)
Employment Type: Full-time
This role is with Morela please respond to (see below) for further informaiton
Do you want to be part of something special? Morela is proud to represent our exclusive client, a fast-growing start-up transforming Service Operations. Led by industry leaders with a proven track record of building and scaling successful businesses, this company is redefining how enterprises monitor, manage, and optimise IT operations. This is your chance to join a team shaping the future of observability and operational intelligence from the ground up.
We are seeking a skilled Observability Developer to design, build, and optimise observability solutions that help enterprise clients gain actionable insights from their logs, metrics, traces, and events. In this role, you will reduce noise, improve reliability, and accelerate innovation by integrating monitoring platforms, ITSM tools, and AIOps engines while embedding observability best practices into delivery pipelines.
Key Responsibilities:
Design and implement observability pipelines across logs, metrics, events, and traces
Build integrations and automation between monitoring/alerting platforms, ITSM tools, and AIOps engines
Optimise alerting strategies to reduce noise and improve signal quality
Develop dashboards, visualisations, and reports for technical and business stakeholders
Deploy observability solutions in cloud and hybrid environments
Contribute to observability strategy and best practices within the Service Operations Framework
Collaborate with development, operations, and SRE teams to embed observability into the full delivery life cycle
Skills & Experience:
Strong background in observability, monitoring, and event management
Hands-on experience with platforms such as Dynatrace, Datadog, AppDynamics, Splunk, Prometheus, Grafana, New Relic, or Elastic
Experience building integrations and automation using APIs, Python, Node.js, Go, or Scripting
Familiarity with AIOps platforms (BigPanda, Moogsoft, etc.)
Knowledge of ITSM/incident management processes and tools (Halo ITSM, ServiceNow, Jira Service Management)
Cloud experience (AWS, Azure, GCP) and deploying observability tools in cloud-native environments
Understanding of OpenTelemetry and modern observability standards
Strong problem-solving skills and ability to work in a fast-paced start-up or consulting environment
Why Join:
Work with our exclusive client, a high-growth start-up backed by proven Service Operations leaders
Work on cutting-edge projects across multiple industries
Shape both client outcomes and the company’s frameworks and offerings
Thrive in a collaborative culture where ideas are valued, careers grow quickly, and impact is immediate
Sounds great right? Don’t hesitate to apply today.
Senior + Associate Security Analysts - Security-cleared
Parker Shaw
London
Hybrid
Senior
£35/day
RECENTLY POSTED
aws
splunk
We are currently recruiting for Senior Cyber Security Analysts and Associate Security Analysts - both working a 3-month contract for our client 3 days per week on-site in London.
As a senior security analyst with responsibility for incident response, you will:
lead the investigation of security alerts to understand the nature and extent of possible cyber incidents
lead the forensic analysis of systems, files, network traffic and cloud environments
lead the technical response to cyber incidents by identifying and implementing (or coordinating the implementation of) containment, eradication and recovery actions
support the wider coordination of cyber incidents
review previous incidents to identify lessons and actions
identify and deliver opportunities for continual improvement of the incident response capability
work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities
develop and update internal plans, playbooks and knowledge base articles
act as an escalation point for, and provide coaching and mentoring to, security analysts
be responsible for leadership and line management of security analysts
Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join.
We’re interested in people who have:
significant experience investigating and responding to cyber incidents
significant experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents
experience managing and coordinating the response to cyber incidents
experience coaching and mentoring junior staff
an in-depth understanding of the tools, techniques and procedures used by threat actors
excellent analytical and problem solving skills
excellent verbal and written communication skills
It’s desirable, but not essential, that you have:
experience with Splunk
experience working in an Agile environment
experience with cloud environments such as AWS
As an associate security analyst you will:
triage and investigate cyber security alerts and reports from users
use a variety of techniques to analyse systems, files, network traffic and cloud environments and understand the nature and extent of possible cyber incidents
support the technical response to cyber incidents by identifying and implementing (or supporting the implementation of) containment, eradication and recovery actions
support the coordination of cyber incidents
contribute to post-incident reviews to identify lessons and actions
identify opportunities for, and support the delivery of, continual improvements to the incident investigation and response capability
work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities
contribute to internal plans, playbooks and knowledge base articles
act as an escalation point for, and provide coaching and mentoring to, apprentice security analysts
be responsible for line management of apprentice security analysts
Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join
We’re interested in people who have:
experience investigating and responding to cyber incidents
experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents
Experience with SIEM tools (experience of Splunk preferred but experience of Microsoft Sentinel or an equivalent SIEM tool is acceptable)
an understanding of the tools, techniques and procedures commonly used by threat actors
good analytical and problem-solving skills
good verbal and written communication skills
It’s desirable, but not essential, that you have:
experience with Splunk
experience working in an Agile environment
experience with cloud environments such as AWS
If you feel you have the skills and experience needed for this role; please do apply now.
Lead Technical Consultant - Service Operations - Dynatrace
VIQU Ltd
London
Hybrid
Leader
£75k - £100k
RECENTLY POSTED
dynatrace
splunk
datadog
opentelemetry
Job Title: Lead Technical Consultant - Service Operations - Dynatrace, AppDynamics, Datadog
Location: Hybrid (UK, with travel as required)
Type: Full-time
Do you want to be part of something special? Morela is representing a high-growth start-up redefining IT Operations, led by a serial entrepreneur with a proven track record of building successful businesses. This is your chance to join a team breaking the mold in enterprise service delivery and shaping the future of IT Operations from the ground up.
We’re looking for a Lead Technical Consultant who thrives in complex enterprise environments and loves working with cutting-edge technology. You will design, implement, and optimise IT Operations solutions across observability, AIOps, and ITSM platforms, help clients adopt best practices in Event Management and OpenTelemetry, and act as a trusted technical advisor bridging technology and business strategy. You’ll also help develop frameworks, accelerators, and methodologies that define how the company delivers its services.
Skills & Experience:
5+ years in IT Operations, consulting, or related technical roles
Hands-on experience with observability platforms: Dynatrace, AppDynamics, Datadog
Experience with AIOps/ITSM tools: BigPanda, Splunk ITSM, ServiceNow, or equivalent
Expertise in Event Management and OpenTelemetry
Strong knowledge of ITSM/ITIL frameworks and Enterprise Architecture principles
Proven experience delivering solutions to large enterprise clients
Ability to bridge technical delivery with business strategy, advising senior stakeholders
Excellent problem-solving, communication, and stakeholder management skills
Experience implementing and optimising IT Operations solutions across multiple technologies
Compensation & Benefits:
Base salary: £75,000 - £100,000 (depending on experience)
Annual performance bonus
25 days’ annual leave plus bank holidays
Hybrid working with flexibility around client engagements
Opportunity to work on innovative, high-impact projects in a fast-growing start-up
If you’re ready to push boundaries in IT Operations and make a tangible impact, this is the role for you.
Backend Software Engineer Java - Fintech
Client Server Ltd.
London
In office
Mid
£90k - £100k
RECENTLY POSTED
java
aws
spring-boot
redis
terraform
grafana
+3
Backend Software Engineer / Developer (Java AWS) London / WFH to £100k
Opportunity to progress your career in a senior, hands-on Backend Software Engineer role at a global FinTech / CFD trading company that has been consistently voted as one of the UKs top employers.
W****hat’s in it for you:
Salary to £100k + Bonus
Pension, Private Medical Care, Life Assurance
Option to buy or sell holiday days
Wellness benefits and gym subsidy
Childcare vouchers
Enhanced paternity leave including shared parental pay and leave
Employee led LGBTQ+, Women’s, Black and Parents & Carers networks with an annual budget for organising events and projects that foster an open, diverse and inclusive culture
Plus a range of other perks
Your role:
As a Backend Software Engineer you will join a fairly new team working on a new crypto offering to design, develop and implement high performance cloud-native backend services including owning DevOps processes to ensure systems are robust, secure and observable. You’ll be working with a modern tech stack using Java, Spring Boot, CI/CD, Kubernetes, AWS, EKS and Grafana / Splunk.
About you:
You have advanced backend software engineering experience with Java, Spring Boot, REST, Postgres, Redis
You have experience of running production workloads on Kubernetes (Amazon EKS preferred)
You have a good knowledge of DevOps practices including CI/CD, IaC (Terraform) and container orchestration
You have experience with observability tooling
You have a solid understanding of secure coding and deployment practices
You’re collaborative and pragmatic with great communication skills
Apply now to find out more about this Backend Software Engineer / Developer (Java AWS) opportunity.
Associate Security Analyst
GTC Recruitment Limited
London
In office
Mid
Private salary
RECENTLY POSTED
aws
splunk
Our client is seeking an experienced Associate Security Analyst to join their Cyber Defence team. This is a hands-on role where you will investigate and respond to cyber security incidents that could impact critical systems and services across the UK.
You will play a key part in identifying threats, supporting incident response, and helping to continually improve the organisation’s cyber defence capabilities. The role also involves mentoring apprentice analysts and joining an out-of-hours on-call rota to ensure 24/7 coverage of potential cyber incidents.
Key Responsibilities
Investigate and triage cyber security alerts and user reports.
Analyse systems, files, network traffic, and cloud environments to determine the extent of incidents.
Support technical responses to incidents, including containment, eradication, and recovery.
Contribute to post-incident reviews and develop lessons learned.
Create and improve incident response playbooks and knowledge base articles.
Work closely with wider Cyber Defence functions to strengthen security operations.
Act as an escalation point for apprentice security analysts, providing coaching, mentoring, and line management.
What We’re Looking For
2-3 years’ experience investigating and responding to cyber incidents.
Hands-on use of SIEM tools (Splunk preferred, Microsoft Sentinel or equivalent acceptable).
Experience with EDR solutions to support incident investigation.
Understanding of threat actor tools, techniques, and procedures (TTPs).
Strong analytical and problem-solving skills.
Excellent written and verbal communication skills.
Desirable skills:
Advanced Splunk experience or certification.
Experience in Agile environments.
Familiarity with cloud environments such as AWS.
Interview Process
The interview will be conducted via Microsoft Teams and will consist of:
A short competency-based discussion.
A practical Splunk exercise to investigate a simulated cybersecurity scenario.
A short technical quiz covering general cybersecurity knowledge.
Senior Cyber Security Analyst
Damia Group Ltd
London
Hybrid
Senior
£600/day - £800/day
RECENTLY POSTED
splunk
*Senior Cyber Security Analyst - £600-800pd (experience dependent) INSIDE IR35 - 3 month initial contract - London (3 days per week onsite)*
Please note: Due to the nature of the role, we are ideally looking for candidates to hold an active SC clearance.
We are looking for a SC Cleared Senior Cyber Security Analyst with SPLUNK experience to join our central government client on an initial 3-month contract. You must have experience investigating and responding to cyber incidents, co-ordinating incident response in a large organisation.
We have both a Senior and mid-level role available.
Main responsibilities:
As a senior security analyst with responsibility for incident response, you will:
Lead the investigation of security alerts to understand the nature and extent of possible cyber incidents
Lead the forensic analysis of systems, files, network traffic and cloud environment
Lead the technical response to cyber incidents by identifying and implementing (or coordinating the implementation of) containment, eradication and recovery actions
Support the wider coordination of cyber incidents
Review previous incidents to identify lessons and actions
Identify and deliver opportunities for continual improvement of the incident response capability
Work closely alongside other Cyber Defence functions, supporting the continual improvement of wider capabilities
Develop and update internal plans, playbooks and knowledge base articles
Act as an escalation point for, and provide coaching and mentoring to, security analysts
Be responsible for leadership and line management of security analysts
Cyber incidents can and do arise on a 24/7 basis. The team operates an out-of-hours on call rota, which you will be expected to join.
Essential skills and experience:
SPLUNK
EDR (Endpoint Detection and Response)
Significant experience investigating and responding to cyber incidents
Significant experience using security tools (eg, EDR, SIEM) to support the investigation and response to cyber incidents
Experience managing and coordinating the response to cyber incidents
Experience coaching and mentoring junior staff
An in-depth understanding of the tools, techniques and procedures used by threat actors
Damia Group Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept our Data Protection Policy which can be found on our website.
Please note that no terminology in this advert is intended to discriminate on the grounds of a person’s gender, marital status, race, religion, colour, age, disability or sexual orientation. Every candidate will be assessed only in accordance with their merits, qualifications and ability to perform the duties of the job.
Damia Group is acting as an Employment Business in relation to this vacancy and in accordance to Conduct Regulations 2003.
Defence Senior Cyber Security Analyst - 3 months
NonStop Consulting
London
Hybrid
Senior
Private salary
RECENTLY POSTED
splunk
We are currently recruiting for Defence Associate Security Analysts with knowledge of Cyber security threats using SPLUNK and EDR (Endpoint Detection and Response) to join a great project for 3 months, that is ran by a Central Government Authority.
The best thing about this opportunity is that you will have a great work-life balance with remote working, thus you will be able to organise your time up to your liking (2-3 days/ week in London office)
Essential Experience:
Experience of investigating and responding to cyber incidents, coordinating incident response in large org
5+ years’ experience
SPLUNK and EDR (Endpoint Detection and Response)
Analytical, problem solving oriented
MOD/DEFENCE - highly desirable
SC Clearance - Candidates holding active SC will benefit of a quick start date
What you will gain:
Amazing rate for great affordability
Remote working that you can spend less time travelling and enjoy some time at home
Central Government Contract so you can improve prospects for future contracting
Interviews will start as soon good candidates are available, if you are interested do not delay the response and forward you updated CV today.
If you would like to discuss further about this opportunity or others in the UK Public Sector, please reach out (phone number removed) (extension 8144) and ask for Cristina Ghenu or you may email me at (url removed)
Guaranteed Interview Scheme
As a member of the GIS scheme, our client guarantees to interview all candidates who have a Disability/ or Veteran / or has a Military spouse/partner and who meet all the essential criteria for the vacancy. In cases where we have a high volume of candidates who meet all the essential criteria, we will interview the best candidates from within that group.
If you qualify for the above, please notify us on (url removed)
Defence Associate Security Analyst - 3 months
NonStop Consulting
London
Hybrid
Mid
Private salary
RECENTLY POSTED
aws
splunk
We are currently recruiting for Defence Associate Security Analysts with knowledge of Cyber security threats using SPLUNK to join a great project for 3 months, that is ran by a Central Government Authority.
The best thing about this opportunity is that you will have a great work-life balance with remote working, thus you will be able to organise your time up to your liking (2-3 days/ week in London office)
Essential Experience:
As an associate security analyst you will triage and investigate cyber security alerts and reports from users
experience using security tools (e.g., EDR, SIEM) to support the investigation and response to cyber
incidents
Experience with SIEM tools (experience of Splunk preferred but experience of Microsoft Sentinel or an
equivalent SIEM tool is acceptable)
Experience in AWS environment
MOD/DEFENCE - highly desirable but not essential.
SC Clearance - Candidates holding active SC will benefit of a quick start date
What you will gain:
Amazing rate for great affordability
Remote working that you can spend less time travelling and enjoy some time at home
Central Government Contract so you can improve prospects for future contracting
Interviews will start as soon good candidates are available, if you are interested do not delay the response and forward you updated CV today.
If you would like to discuss further about this opportunity or others in the UK Public Sector, please reach out (phone number removed) (extension 8144) and ask for Cristina Ghenu or you may email me at (url removed)
Guaranteed Interview Scheme
As a member of the GIS scheme, our client guarantees to interview all candidates who have a Disability/ or Veteran / or has a Military spouse/partner and who meet all the essential criteria for the vacancy. In cases where we have a high volume of candidates who meet all the essential criteria, we will interview the best candidates from within that group.
If you qualify for the above, please notify us on (url removed)
Associate Security Analyst
GTC Recruitment
London
Hybrid
Mid
Private salary
RECENTLY POSTED
aws
splunk
Location: London (Hybrid 60% onsite per week)
Contract Type: 3 months (potential for extension)
Organisation: Our client, a leading UK Government Department
Clearance Required: Security Check (SC)
Start Date: ASAP
About the Role
Our client is seeking an experienced Associate Security Analyst to join their Cyber Defence team. This is a hands-on role where you will investigate and respond to cyber security incidents that could impact critical systems and services across the UK.
You will play a key part in identifying threats, supporting incident response, and helping to continually improve the organisation s cyber defence capabilities. The role also involves mentoring apprentice analysts and joining an out-of-hours on-call rota to ensure 24/7 coverage of potential cyber incidents.
Key Responsibilities
Investigate and triage cyber security alerts and user reports.
Analyse systems, files, network traffic, and cloud environments to determine the extent of incidents.
Support technical responses to incidents, including containment, eradication, and recovery.
Contribute to post-incident reviews and develop lessons learned.
Create and improve incident response playbooks and knowledge base articles.
Work closely with wider Cyber Defence functions to strengthen security operations.
Act as an escalation point for apprentice security analysts, providing coaching, mentoring, and line management.
What We re Looking For
2 3 years experience investigating and responding to cyber incidents.
Hands-on use of SIEM tools (Splunk preferred, Microsoft Sentinel or equivalent acceptable).
Experience with EDR solutions to support incident investigation.
Understanding of threat actor tools, techniques, and procedures (TTPs).
Strong analytical and problem-solving skills.
Excellent written and verbal communication skills.
Desirable skills:
Advanced Splunk experience or certification.
Experience in Agile environments.
Familiarity with cloud environments such as AWS.
Interview Process
The interview will be conducted via Microsoft Teams and will consist of:
A short competency-based discussion.
A practical Splunk exercise to investigate a simulated cybersecurity scenario.
A short technical quiz covering general cybersecurity knowledge.
Why Join?
This is a unique opportunity to contribute to protecting vital government services in a high-profile environment. You ll be part of a collaborative Cyber Defence team, gain exposure to advanced security tooling, and play an important role in shaping and improving cyber incident response capabilities.
Cyber Security Analyst - Milton Keynes/East Kilbride
Resourgenix Ltd
Not Specified
Hybrid
Mid
£657/day
RECENTLY POSTED
splunk
The Client: A government department client is looking for a Senior Cyber Security Analyst to join them on a 12 month contract. This position will be in East Kilbride or Milton Keynes/hybrid.
Job Summary: Responsible for operational security and assisting with the design, implementation and development security controls and systems. Ensure that incidents are detected, prioritised, investigated, contained, remediated and that operational security controls are measured and constantly improved. Continually evaluate, review and advise on current developments in all areas of cyber security and cyber threats; Apply appropriate security controls to all hardware and software assets. Proactively monitor networks and systems for evidence of potential threats. Lead response activities to minimise the impact of cyber incidents, including technical investigation into the root cause and extent of any damage. Deliver awareness training on cyber security standards, policies and best practices. Ensure remediation work identified by IT Health Checks and Audits is undertaken. Provide constant review and improvement of cyber security policies, best practice and implementation. Typical skills: Proven ability to identify, investigate and remediate complex cyber security issues; Firewall and network security; Experience working with one or more cloud environment; An understanding of key attacker techniques and capabilities models; and the various Cyber Kill Chain frameworks Experience in securing cloud platform; Encryption; Knowledge in threat modelling and ethical hacking; Extensive experience working with SIEM solutions; Basic experience in some scripting languages
Networking, SOC, Infrastructure background is good.
Security Analyst apply due diligence to triaging issues, up to date with modern threats.
Splunk, M365, Cloud, MS Defender.
Ability to run a problem shows experience/ seniority.
Lead on complex/ advanced pieces of work.
Splunk Site Reliability Engineer
Flint UK Technology Services
Birmingham
Hybrid
Mid
Private salary
RECENTLY POSTED
splunk
puppet-labs
ansible
python
elasticsearch
kibana
+1
Job Title: Splunk Site Reliability Engineer/Migration Specialist (Contract)
Location: Birmingham (Hybrid/On-site, required 3 days per week)
Contract Type: Contract
**Duration:**3 months rolling
Job Summary:
We are seeking an experienced Splunk SME/Migration Specialist to lead and support the migration of observability workloads from Splunk to Elasticsearch (ELK Stack). The ideal candidate will bring hands-on expertise in Splunk architecture, data ingestion, alerting, and dashboarding, along with experience migrating workloads to Elasticsearch.
In addition to migration duties, the candidate will maintain and enhance existing Splunk infrastructure, provide incident support, manage upgrades, and ensure observability platforms remain secure and performant. This role demands a technically strong individual with excellent stakeholder communication and problem-solving skills.
Key Responsibilities: Migration:
Develop and implement a comprehensive migration strategy from Splunk to Elasticsearch (ELK Stack).
Assess existing Splunk configurations (dashboards, alerts, saved searches, data models) and recreate them in Kibana.
Collaborate with Elastic teams to configure alerting and monitoring using Kibana, Elasticsearch Watcher, or third-party tools.
Ensure migration plans include validation, rollback procedures, and knowledge transfer.
Platform Operations & Incident Response:
Maintain Splunk infrastructure in both Production and Non-Production environments.
Support Splunk SRE and Application teams in incident investigation and resolution.
Proactively monitor system health and performance metrics.
Upgrades and Change Management:
Plan and execute upgrades to Splunk components.
Perform pre- and post-upgrade checks and validations.
Prepare documentation and submit Change Requests following organizational procedures.
Security and Compliance:
Work with Puppet and other automation tools to ensure timely patching of vulnerabilities.
Implement and verify security best practices for observability platforms.
Support compliance initiatives and audits.
Documentation and Knowledge Sharing:
Maintain accurate and up-to-date technical documentation, including architecture diagrams, configurations, procedures, and troubleshooting guides.
Review and update support articles and take ownership of relevant assets.
Support knowledge transfer across teams as needed.
Troubleshooting and Support:
Identify and resolve issues in Splunk and ELK environments.
Assist teams with Splunk-related queries and optimization efforts.
Skills and Qualifications: Essential:
Proven expertise with Splunk architecture, data ingestion, dashboarding, alerting, and administration.
Experience migrating Splunk workloads to Elasticsearch (ELK Stack).
Solid understanding of Kibana, Elasticsearch Watcher, and observability tooling.
Proficiency in Linux/Unix systems and networking protocols.
Hands-on experience with Scripting (eg, Python, Shell/Bash).
Experience supporting or working alongside DevOps/SRE teams.
Strong analytical, troubleshooting, and communication skills.
Desirable:
Experience with containerized environments such as Docker or Kubernetes.
Industry certifications such as Splunk Certified Power User/Admin/Architect.
Knowledge of automation tools (eg, Puppet, Ansible).
Bachelor’s degree in Computer Science, Information Systems, or related field.
Key Attributes:
Independent and proactive problem-solver.
Collaborative and able to work cross-functionally with infrastructure, security, and application teams.
Able to work under pressure and prioritize tasks effectively.
Strong communicator, both written and verbal.
Security Engineer
Experis
London
In office
Mid
£600/day - £650/day
RECENTLY POSTED
aws
kubernetes
splunk
gitlab
Role Title: Security Engineer
Start Date: ASAP
End Date: 31st Mar 2026
Location: South of Manchester or Glasgow - 3 days on site per week
Rate: 600 per day - PAYE via Umbrella Only
Role Overview:
We are seeking a highly capable Security Engineer to join a focused team developing a telemetry pipeline MVP. This role requires deep technical expertise in containerised environments, observability tooling, and secure infrastructure design. The ideal candidate will ensure that security is embedded across the pipeline architecture, from deployment to data flow, while collaborating closely with DevOps and development teams.
Key Responsibilities:
Design and implement security controls across containerised environments using Kubernetes and OpenShift
Ensure secure configuration and access management within GitLab version control and CI/CD pipelines
Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog
Conduct threat modelling, vulnerability assessments, and risk analysis for the telemetry pipeline
Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows
Monitor and respond to security events and alerts from observability platforms
Maintain documentation of security architecture, policies, and incident response procedures
Required Skills & Experience:
Strong hands-on experience with Kubernetes and OpenShift in secure production environments
Proficiency in GitLab and secure CI/CD pipeline practices
Familiarity with telemetry and logging tools: Cribl, Elastic, Splunk, Fluentd, and Syslog
Deep understanding of networking protocols, firewalls, VPNs, and security principles
Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements
Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners
Excellent analytical and communication skills
Preferred Qualifications:
Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent
Experience in building MVPs or working in startup-like environments
Familiarity with cloud security (AWS, Azure, GCP)
Python, Golang, and Public Cloud platforms (AWS/GCP) Engineer
eTeam Workforce Limited
Birmingham
Hybrid
Mid
£460/day - £490/day
python
goland
prometheus
terraform
ansible
grafana
+5
Job Title: Senior Software Engineer (Python, Golang, and Public Cloud platforms (AWS/GCP)
Work Mode: Hybrid (2-3 weeks from office)
Contract Duration: 6months + (extension possible based on performance)
Location Options: Sheffield/Birmingham/Edinburgh
Conversion: Candidates should be open to FTE conversion
Role Overview
We are seeking a Senior Software Engineer to join a high-performing team within one of the world’s leading financial institutions. The role involves designing and developing secure, scalable, and high-availability cloud-native services, leveraging Python, Golang, and Public Cloud platforms (AWS/GCP). This is an exciting opportunity to build impactful systems in a regulated environment while working on cutting-edge technologies.
Key Responsibilities
Design, develop, and maintain highly available REST API services and Front End clients using Python, Golang, Docker, and Cloud-Native services.
Implement and manage database schema changes using Liquibase, ensuring compliance with audit and security standards.
Collaborate with Architecture and DevOps teams to enhance and mature product capabilities.
Perform root cause analysis and resolve incidents/performance bottlenecks.
Required Qualifications & Experience
Bachelor’s/Master’s degree in Computer Science or equivalent industry experience.
Strong software engineering background with exposure to infrastructure.
5+ years of hands-on development experience with large-scale, distributed systems.
Proficiency in Python, Golang, PostgreSQL.
Experience with Liquibase or similar database change/versioning tools.
Hands-on expertise with AWS/GCP (IAM, KMS, cloud-native services, storage).
Solid understanding of DevOps practices (IaC using Terraform, CI/CD pipelines with Jenkins/GitLab CI, containerization).
Strong knowledge of security principles, compliance, and audit frameworks in enterprise systems.
Proven ability to deliver complex projects in regulated environments.
Essential Skills
Demonstrable expertise in:
Public Cloud (AWS/GCP)
Linux systems
Relational & NoSQL databases
Integration services (messaging, streaming)
RESTful API development
Containerization (Docker, Kubernetes, serverless functions)
Microservices, distributed tracing
Enterprise logging, monitoring & alerting frameworks (ELK, Splunk, Prometheus, Grafana)
Programming expertise in Python & Golang.
Good understanding of cryptography (authentication, encryption).
Non-functional testing experience.
Agile environment experience.
Desirable Skills
Experience in financial services or other regulated industries.
Exposure to Continuous Integration, Delivery, and Testing tools.
Hands-on with automation Scripting (Terraform, Ansible, etc.).
Cloud Architect GCP, AWS or Azure - MOD DV - Perm
Sanderson
Wiltshire
In office
Mid
£80k - £95k
aws
terraform
kubernetes
python
bash
splunk
Cloud Architect - MOD DV - Perm
Location: Corsham, 4 days on-site
Clearance: Active MOD DV - Must have DV in place, no scope for sponsorship
Salary: £80,000 - £95,000 + Benefits
An exciting opportunity has opened up to join one of Google Cloud’s primary technical partners, as they push on with a new programme of work in the UK Defence sector, utilising cutting edge Cloud technologies.
The role suits a Cloud Architect with a defence background that has an interest in utilising their AWS/Azure experience and up-skilling with GCP certifications and a training programme. As well as applying any existing GCP experience.
About the role
As a Cloud Architect you will be responsible for designing and advising on secure cloud architectures within Google Cloud Platform (GCP), ensuring compliance with UK and international standards. You will work with clients across sectors to assess risks, implement robust security controls, and guide secure cloud adoption strategies. This role requires a strong understanding of cloud-native security, regulatory frameworks, and the ability to translate technical risks into business impact.
Part of this role, you will be required to obtain GCP certification.
What You’ll Do:
Design and implement secure architectures, incorporating identity, access management, encryption, and network security.
Conduct cloud security assessments and gap analyses for UK-based organisations.
Advise on compliance with UK regulations (e.g. GDPR, NCSC Cloud Security Principles, ISO 27001).
Develop and enforce cloud security policies, procedures, and governance models.
Lead threat modelling, risk assessments, and vulnerability management initiatives.
Configure and manage security tools such as Google SecOps tooling, Security Command Center, Cloud Armour, and VPC Service Controls.
Collaborate with engineering and DevOps teams to embed security into CI/CD pipelines.
Support incident response planning and cloud-specific disaster recovery strategies.
Stay up to date with GCP security features, UK regulatory changes, and emerging threats.
Requirements
What You’ll Bring
Essential Skills & Experience:
Experience in cloud security.
Strong knowledge of:
Security services (IAM, Cloud KMS, VPC Service Controls, etc.)
UK data protection and compliance frameworks (GDPR, ICO guidance)
Identity federation, SSO, and role-based access control
Network segmentation and firewall configuration in cloud environments.
Logging, monitoring, and SIEM integration (e.g. Splunk, Chronicle)
Experience with Infrastructure as Code (Terraform, Deployment Manager).
Desirable:
Google Cloud Professional Cloud Security Engineer certification.
Experience with UK public sector or regulated industries (e.g. finance, healthcare).
Familiarity with container security (GKE, Kubernetes RBAC, image scanning).
Proficiency in scripting (Python, Bash) for automation and tooling.
Experience with incident response in cloud-native environments.
Previous consultancy experience within UK public sector organisations.
If you’re interested in the above, reach out to or apply
Reasonable Adjustments:
Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built, and we welcome applications from people of all backgrounds and perspectives. Our success is driven by our people, united by the spirit of partnership to deliver the best resourcing solutions for our clients.
If you need any help or adjustments during the recruitment process for any reason***,*** please let us know when you apply or talk to the recruiters directly so we can support you.
Page 1 of 4

Frequently asked questions

What types of Splunk jobs are listed on this job board?
Our job board features a wide range of Splunk-related positions, including Splunk Administrators, Developers, Architects, Security Analysts, and Consultants across various industries and experience levels.
Do I need certifications to apply for Splunk jobs here?
While not always mandatory, many employers prefer candidates with Splunk certifications such as Splunk Core Certified User, Splunk Core Certified Power User, or Splunk Certified Admin to demonstrate proficiency and increase your chances of getting hired.
Can I filter Splunk job listings by location or remote work options?
Yes, our platform allows you to filter job listings by location, including remote or hybrid work options, so you can find Splunk roles that best match your preferences.
Are there opportunities for both entry-level and senior Splunk professionals?
Absolutely! We list Splunk jobs suitable for all experience levels, from entry-level positions ideal for recent graduates or those new to Splunk, to senior roles requiring extensive expertise.
How often are new Splunk jobs posted on the job board?
New Splunk job listings are added regularly, often daily, ensuring you have access to the latest opportunities in the field.