Consultant / Senior Consultant - Cybersecurity Operation Centre (Splunk Engineer) - Tech Consulting
- Ebene, Mauritius
- Permanent
- Full-time
The role spans AWS environments, endpoint security, threat detection, and automated response, delivering advanced SOC and observability capabilities in a 24×7 operational environment.Key Responsibilities
- Own and execute Splunk migration projects from on-premises to Splunk Cloud (SaaS), ensuring minimal disruption, scalability, and adherence to Splunk best practices.
- Design, implement, and maintain Splunk security and observability use cases, dashboards, reports, and alerts for SOC, threat hunting, and IT operations.
- Integrate Splunk with SentinelOne (Singularity Platform) for EDR/XDR telemetry ingestion, advanced correlation, and endpoint-driven threat detection and response.
- Correlate SentinelOne alerts, behavioral detections, storyline data, and endpoint telemetry with Splunk Enterprise Security for enhanced investigation and threat hunting.
- Integrate Splunk with UEBA, AI-driven analytics, Wazuh, SentinelOne, Cisco XDR/SOAR, and other security tools to enable end-to-end detection and response.
- Develop and maintain correlation searches, risk-based alerting (RBA), and ES notable events leveraging endpoint, network, cloud, and identity data.
- Perform Splunk platform administration, including installation, upgrades, performance tuning, index/storage optimization, and troubleshooting.
- Design and maintain custom parsers, field extractions, lookups, and CIM-compliant normalization for diverse log sources, including endpoint and EDR data.
- Onboard and manage AWS security and operational logs (CloudTrail, GuardDuty, VPC Flow Logs, ELB/ALB, CloudWatch, Security Hub) into Splunk.
- Develop and document SOAR/XDR playbooks integrating Splunk with SentinelOne and Cisco XDR for automated containment, isolation, remediation, and enrichment.
- Collaborate with SOC, IR, and IT teams to identify detection gaps and create custom security use cases aligned with business and risk priorities.
- Provide guidance and enablement to L1/L2 SOC analysts on Splunk, SentinelOne alert triage, investigations, and response workflows.
- Maintain documentation including architecture diagrams, SOPs, onboarding guides, and runbooks.
- Stay current with Splunk, SentinelOne, XDR/EDR trends, and emerging threat techniques (MITRE ATT&CK).
- Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience).
- Strong experience with Splunk Enterprise and/or Splunk Cloud (SaaS), including architecture, deployment, and migrations.
- Hands-on experience integrating SentinelOne EDR/XDR with SIEM platforms (Splunk), including API-based ingestion and alert correlation.
- Solid understanding of endpoint security concepts, malware behavior, ransomware detection, lateral movement, and persistence techniques.
- Experience with Wazuh, UEBA, AI/ML-driven analytics, and security data enrichment.
- Proficiency in log ingestion, indexing, SPL searches, dashboards, correlation rules, alerts, and knowledge objects.
- Experience with Splunk Enterprise Security (ES) and risk-based alerting models.
- Hands-on experience ingesting and analyzing AWS cloud security logs in Splunk.
- Familiarity with Cisco security ecosystem, including Umbrella, Secure Firewall, Secure Endpoint, Cisco XDR, SOAR playbooks, SecureX.
- Understanding of networking, operating systems (Windows/Linux), and SOC operations.
- Splunk certifications (Core, ES, Cloud Admin) and SentinelOne or XDR-related certifications are a strong plus.
- Strong analytical, investigative, and problem-solving skills.
- Ability to translate technical detections into actionable SOC outcomes.
- Excellent communication and collaboration skills across SOC, IR, and IT teams.
- Comfortable working in a fast-paced, 24/7 SOC environment.
- Proactive mindset with a focus on automation, detection maturity, and continuous improvement.
- 3-5 years of experience in Splunk administration, security engineering, or SOC analytics.
- Proven experience with Splunk Cloud migrations, SaaS management, or large-scale deployments.
- Hands-on experience integrating SentinelOne with SIEM/SOAR for endpoint detection, automated containment, and investigation workflows.
- Experience creating security use cases and SOAR/XDR playbooks using Splunk ES, SentinelOne, and Cisco XDR.
- Exposure to threat hunting, incident response, and MITRE ATT&CK-aligned detections.
- Support, coaching, and feedback from some of the most engaging colleagues around.
- Opportunities to develop new skills and progress your career.
- The freedom and flexibility to handle your role in a way that's right for you.