Elastic SIEM Specialist
The Talent Locker
Farnborough, United Kingdom
3 days ago
Role details
Contract type
Permanent contract Employment type
Full-time (> 32 hours) Working hours
Regular working hours Languages
English Compensation
£ 131KJob location
Farnborough, United Kingdom
Tech stack
Computer Security
Query Languages
Elasticsearch
Log Analysis
Kusto Query Language
Security Information and Event Management
Data Streaming
Kibana
Job description
- Support NESTOR operations by building, tuning, and operating threat detection, log ingestion, and operational dashboards within Elastic
- Focus on improving detection quality and investigating alerts
- Collaborate closely with operational teams to deliver effective SIEM capabilities in constrained, mission-driven environments
- Ensure successful SIEM operations through effective management of log ingestion and data flow
- Design and maintain Kibana dashboards for enhanced operational visibility
- Triage SIEM alerts, investigate incidents, and determine root causes in a timely manner
- Write detection logic to refine threat identification processes
Technologies:
- ElasticSearch
- Flow
- Support
- Kibana
- Security, We are a Defence consultancy located in Farnborough, seeking an experienced Elastic SIEM Subject Matter Expert for a contract position. Our project focuses on significant security operations within MOD/Defence environments. This role requires onsite work, and successful candidates must be security cleared at DV Level prior to appointment. We offer a collaborative team environment, focusing on developing high-quality threat detection capabilities and operational dashboards.
Requirements
- Strong hands-on experience with Elasticsearch, Kibana, and Elastic SIEM in operational environments
- Proven experience developing, tuning, and optimising SIEM detection rules to identify threats and reduce false positives
- Experience managing log ingestion pipelines and ensuring reliable data flow into Elasticsearch
- Proficiency in log parsing, normalisation, and enrichment to support high-quality detections
- Hands-on experience designing and maintaining Kibana dashboards for operational visibility
- Ability to triage SIEM alerts, investigate incidents, and determine root causes
- Familiarity with security operations workflows and incident response processes
- Experience writing detection logic using EQL, KQL, or similar query languages