Job Search and Career Advice Platform

Enable job alerts via email!

SIEM Application Engineer

Experis

Tyseley

On-site

GBP 80,000 - 100,000

Part time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading tech consultancy is seeking an SIEM Application Engineer to enhance security operations. This role involves analyzing and optimizing detections within the Elastic Security platform. The ideal candidate will have hands-on experience with Elastic Security and strong skills in detection logic and reporting. The position is hybrid, based in the UK, and offers a competitive day rate between £450 and £550.

Qualifications

  • Hands-on experience with Elastic Security and Kibana.
  • Strong understanding of detection logic and alert tuning.
  • Familiarity with MITRE ATT&CK.

Responsibilities

  • Analyze alerts from Elastic Security and validate detection accuracy.
  • Tune and optimize existing detection rules.
  • Map detections to the MITRE ATT&CK framework.

Skills

Elastic Security
Kibana
EQL/KQL queries
Threat hunting
Written communication
Job description

Role: SIEM Application Engineer

Location: Birmingham or Manchester or Ipswich (Hybrid)

Duration: 3 Months with possible extension

Day rate: £450 - £550 via Umbrella

Overview

We are looking for an SIEM Application Engineer to support our security operations by reviewing and optimising detections within our production Elastic Security platform. This role focuses solely on detection analysis, rule refinement, and reporting, rather than SIEM platform engineering or DevOps.

Key Responsibilities
  • Analyse alerts generated by Elastic Security and validate detection accuracy.
  • Tune and optimise existing Elastic SIEM detection rules to improve fidelity and reduce false positives.
  • Map detections to the MITRE ATT&CK framework and identify coverage gaps.
  • Produce clear detection reports, tuning documentation, and analysis summaries.
  • Collaborate with SOC analysts, incident responders, and security engineering teams.
Required Skills
  • Hands‑on experience with Elastic Security / Elastic SIEM, Kibana, and Elasticsearch queries (EQL/KQL).
  • Strong understanding of detection logic, alert tuning, and threat behaviours.
  • Familiarity with MITRE ATT&CK.
  • Strong written communication skills for reporting and documentation.
Nice to Have
  • Experience in SOC, detection engineering, or threat hunting.
  • Exposure to common log types (endpoint, network, cloud).
  • Security certifications (Elastic, Security+, CySA+, etc.).
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.