Security Operations Engineer – SIEM & Platform

A global technology company runs a Cyber Center in Prague — around 270 people, with roughly 80 in security operations. They're looking for a Security Operations Engineer who can run SIEM platforms, tune detections, and own the work end-to-end.

Salary 90 000–130 000 CZK gross per month. Hybrid setup in Prague or fully remote is also possible.

Good fit if you have 3–4 years working hands-on with Splunk or Microsoft Sentinel, you're comfortable on Linux, and you'd rather build reliable detections than produce daily PowerPoint reports.

I'm interested

Job Type

Permanent

Job type

Full time

Salary

90.000 - 130.000

Location

Hlavní město Praha
Remote

ID

STQ_523_JOB


About our client

Our client is a global technology and professional services company with a Cyber Center in Prague. The team serves enterprise clients across multiple industries and operates as a mature, production-grade security operation — not a lab, not a pilot.

The Prague team is around 270 professionals. The security operations unit has ~80 people, including roughly 27 engineers who own the technical layer — SIEM platforms, detection pipelines, incident response tooling. English is the language of client-facing work; Czech is day-to-day inside the team.

Why This Role Exists Now:
The security operations team is expanding. Two new engineers are joining — this is one of two roles being filled at the same time. The other role goes deeper on cloud SIEM (separate ad).

The team has experienced engineers who know the detection architecture well, and now is a good moment to join — the knowledge transfer opportunity is real and accessible from day one.

If you've been in an MSSP environment where detection ownership stays with the vendor or a central content team — this role is built differently. Most MSSP setups give you the SIEM. This one gives you the rules.

Job description

Role / Mission:
Your job is to keep the SIEM infrastructure healthy and make sure the detections it runs actually catch things worth catching.

Day-to-day: monitoring and triaging alerts, maintaining log source pipelines, tuning correlation rules, and working with analysts when something escalates. You'll also write and maintain playbooks so the team doesn't reinvent the wheel during incidents.

Tech context: the team runs Splunk and Microsoft Sentinel as primary platforms. QRadar and ArcSight in the mix from legacy clients. Chronicle/Google SecOps is present in some environments — knowledge there is a plus.

Success in 12 months: you own your detection playbooks, you've added at least one meaningful improvement to the ingestion or detection layer, and when someone has a question about platform behavior, they come to you first.

Key Responsibilities:
— Monitor, triage, and investigate alerts across SIEM platforms (primarily Splunk and Microsoft Sentinel)
— Build, tune, and maintain detection rules and correlation logic — SPL, KQL, or both
— Maintain SIEM infrastructure: log sources, ingestion pipelines, platform health, onboarding new data feeds
— Write and update incident response playbooks; support L1/L2 analysts during active investigations
— Participate in on-call rotation; contribute to post-incident documentation and lessons learned

What This Role Is NOT:
— Not a pure L1 analyst position — you're here to engineer and improve, not just watch dashboards
— Not a client-facing sales or advisory role — this is delivery, inside the engine room
— Not a solo build-from-scratch project — you're joining an existing team with live infrastructure

Operating Model:
Standard working hours, no shift work. On-call is a shared rotation across the engineering team. Hybrid setup in Prague or fully remote is also possible. Reports to: Head of Security Engineering. English for client documentation; Czech for internal team communication. Travel is minimal.

Requirements

What Matters Most:
We're not looking for someone who ticked every checkbox on a certification list. Three things actually matter:

— SIEM hands-on time — you've worked with Splunk (SPL queries, correlation searches) or Microsoft Sentinel (KQL, analytics rules) for at least 2 years in a production environment
— Linux system knowledge — you understand how logs are generated, how syslog works, what endpoint telemetry looks like
— Detection thinking — you can write a correlation rule from scratch, explain why it's tuned the way it is, and recognize when a low-severity alert is worth investigating

English needs to be solid for reading technical documentation and writing client-facing reports.
If your background is primarily QRadar or ArcSight — that's a valid starting point. We care more about your engineering instincts than the vendor logo.

Nice to Have:
— Experience with Chronicle/Google SecOps — YARA-L rules, UDM data model
— Familiarity with QRadar or ArcSight from client or previous employer environments
— Security certifications: GCIA, CEH, CompTIA Security+, Microsoft SC-200, or Splunk Core Certified
— Scripting for automation — Python, PowerShell, or bash for log parsing or playbook triggers

Don't let the nice-to-haves stop you. If you have the three core things, the rest can be learned.

Offer & Terms

Compensation & role impact:
— Salary 90 000–130 000 CZK gross / month, based on seniority and experience
— Access to top-tier enterprise projects not available to individual contractors
— Strong project governance and architectural standards
— International environment – not a ticket factory
— Real opportunity to influence and strengthen Prague-based technical leadership

Investing in your future:
— Individual training roadmap prepared for every engineer — paid certifications included (Splunk Core/ES, Microsoft SC-200, SANS and others)
— Support for technical bootcamps
— Employee share purchase program (up to 10% of salary)
— Mentoring and coaching
— Private healthcare
— Contributions to life and pension insurance

Work & flexibility:
— 5 weeks of vacation + sick days
— Company mobile phone
— Employee referral program

Wellbeing & leisure:
— Cafeteria benefits
— Wellness and recreation vouchers

More information

Interested? Let's Talk
If this sounds like your kind of challenge, apply now — let's build something great together.

Throughout the process, you'll be guided by a senior recruiter with hands-on IT experience. Straightforward, technically grounded, without unnecessary recruitment overhead.

Send your CV or LinkedIn profile to or reach out via linkedin.com/in/jirisoljak

Interview process:
— Intro call with SITEQ recruiter — 30 minutes, we'll explain the role and client context
— First interview with the team lead — get to know each other, talk about the team and day-to-day
— Technical interview with a senior engineer from the security operations team — hands-on discussion, no trick questions
— Offer

Please note: this position is open only to candidates eligible to work in the EU without visa sponsorship, able to reside and work in the Czech Republic.

I'm interested
I am interested
>_Let us know about you

    Similar jobs


    Network & Security specialist (Cisco | CheckPoint | F5)

    Location

    Hlavní město Praha
    Hybrid

    Job Type

    Permanent

    Field

    Networks / Security

    Salary

    90.000 - 110.000 CZK

    Leading international technology company specializing in the development and operation of payment systems. They rank among the most significant global providers of payment solutions — their technology and services are used daily by millions of customers and businesses across continents. The company continuously invests in innovation, including blockchain and digital currency technologies, to ensure secure and reliable real-time transaction processing. The Prague team manages core systems that handle payment authorization and processing. The new Network Administrator will play a key role in maintaining, securing, and further developing these mission-critical environments.Requirements • Minimum 4+ years of experience as a Network Administrator or Engineer. • Strong knowledge of network protocols, VPN, and security best practices. • Hands-on experience with CheckPoint, Cisco, and F5 BIG-IP LTM. • Solid Linux administration skills. • Familiarity with network monitoring and management tools. • Communicative English; proficiency in Czech or Slovak required.As part of the core Network & Security team, you’ll be responsible for the design, implementation, and maintenance of enterprise-grade infrastructure spanning data centers and production environments across Europe and the U.S. Your key responsibilities: • Administration of Cisco, CheckPoint, and F5 BIG-IP technologies (routers, switches, Wi-Fi, firewalls, load balancers). • Management of Linux and Windows Server systems (DHCP, proxy, monitoring). • Monitoring, troubleshooting, and incident response, including weekly on-call rotation. • Cooperation with the Security team on upgrades, migrations, and vulnerability remediation. • Preparing documentation and audit reports related to infrastructure compliance. • Continuous improvement of network reliability, performance, and resilience. You will collaborate daily with colleagues from Europe, and the U.S., supporting a 24/7 enterprise environment.Interested? Apply now and speak with a senior IT recruiter who understands both the technology and the people behind it. Please note: This position is open only to candidates eligible to work in the EU without visa sponsorship, residing in the Czech Republic long-term, with proficiency in Czech or Slovak.

    Security Operations Center Analyst

    Location

    Hlavní město Praha

    Job Type

    Permanent
    Contract

    Field

    Networks / Security

    Salary

    50.000-80.000 CZK

    Česká firma působící v oblasti kyberbezpečnosti, která více než dekádu poskytuje služby zákazníkům z privátního i státního sektoru. Pokrývá celé spektrum – od implementace technologií po provoz a rozvoj bezpečnostních služeb. Tým specialistů napříč oblastmi SIEM, SOAR, EDR/XDR, network visibility, threat hunting a vulnerability managementu, přičemž využívají technologie jako IBM QRadar, Elastic Stack, SentinelOne a Fortinet. Bezpečnostní model jejich služeb je postavený na kombinaci Threat Intel, Purple Teamingu a proaktivního vyhledávání hrozeb. Projekty běží pro enterprise zákazníky i organizace kritické infrastruktury.• Zkušenost s prací v oblasti bezpečnostního monitoringu nebo SOC • Orientace v principech logování a analýze událostí z OS, sítí a aplikací • Znalost alespoň některých technologií: SIEM, EDR, IDS/IPS, firewally, antimalware • Základní přehled o IT infrastruktuře – sítě, operační systémy, servery, databáze, cloud • Schopnost vyhodnotit relevantnost alertu a sepsat souvislý záznam • Zájem o oblast kybernetické bezpečnosti a chuť učit se • Analytické uvažování, pozornost k detailu, systematičnost • Angličtina na úrovni práce s technickou dokumentací• Monitoring a analýza bezpečnostních událostí z nástrojů typu SIEM, EDR, IDS/IPS • Eskalace, kategorizace a dokumentace incidentů podle definovaných playbooků a procesů • Vyhodnocení alertů, prvotní analýza a triáž incidentů • Spolupráce s kolegy v oblasti threat huntingu a incident response • Identifikace anomálií, podezřelých vzorců a záznamů v logovacích datech • Příprava podkladů pro forenzní analýzu nebo eskalaci na L2/L3 úroveň • Aktivní podíl na zlepšování detection pravidel a postupů

    IT jobs