SonicJobs Logo
Login
Left arrow iconBack to search

SIEM Application Engineer

Experis
Posted 2 days ago, valid for 2 days
Location

Birmingham, West Midlands B4 6FQ

Salary

£450 - £550 per day

Contract type

Full Time

By applying, a CV-Library account will be created for you. CV-Library's Terms & Conditions and Privacy Policy will apply.

SonicJobs' Terms & Conditions and Privacy Policy also apply.

Sonic Summary

info
  • The role of SIEM Application Engineer is available in Birmingham, Manchester, or Ipswich with a hybrid work model.
  • This is a 3-month contract position with a day rate ranging from £450 to £550 via Umbrella.
  • Candidates should possess hands-on experience with Elastic Security, Kibana, and Elasticsearch queries, along with a strong understanding of detection logic and alert tuning.
  • The position requires collaboration with SOC analysts and focuses on detection analysis, rule refinement, and reporting.
  • A minimum of 3 years of relevant experience in security operations and familiarity with the MITRE ATT& CK framework is preferred.

Role: SIEM Application Engineer

Location: Birmingham or Manchester or Ipswich (Hybrid)

Duration: 3 Months with possible extension

Day rate: 450 - 550 via Umbrella

Overview

We are looking for an SIEM Application Engineer to support our security operations by reviewing and optimising detections within our production Elastic Security platform. This role focuses solely on detection analysis, rule refinement, and reporting, rather than SIEM platform engineering or DevOps.

Key Responsibilities

  • Analyse alerts generated by Elastic Security and validate detection accuracy.
  • Tune and optimise existing Elastic SIEM detection rules to improve fidelity and reduce false positives.
  • Map detections to the MITRE ATT&CK framework and identify coverage gaps.
  • Produce clear detection reports, tuning documentation, and analysis summaries.
  • Collaborate with SOC analysts, incident responders, and security engineering teams.

Required Skills

  • Hands-on experience with Elastic Security / Elastic SIEM, Kibana, and Elasticsearch queries (EQL/KQL).
  • Strong understanding of detection logic, alert tuning, and threat behaviours.
  • Familiarity with MITRE ATT&CK.
  • Strong written communication skills for reporting and documentation.

Nice to Have

  • Experience in SOC, detection engineering, or threat hunting.
  • Exposure to common log types (endpoint, network, cloud).
  • Security certifications (Elastic, Security+, CySA+, etc.).

Apply now in a few quick clicks

By applying, a CV-Library account will be created for you. CV-Library's Terms & Conditions and Privacy Policy will apply.

SonicJobs' Terms & Conditions and Privacy Policy also apply.