A global technology company's Cyber Center in Prague is looking for a SIEM Engineer who truly understands Splunk Enterprise Security or Microsoft Sentinel — not just from a monitoring perspective, but as someone who builds detection logic, maintains data pipelines, and knows when a correlation rule is poorly designed.
Salary: 90 000–130 000 CZK gross/month. Hybrid setup in Prague or fully remote is also possible.
The ideal candidate has 4+ years of experience in security operations with strong hands-on expertise in at least one of the two platforms — and enough curiosity and technical depth to learn the other when needed.
Our client is a global technology and professional services company with a Cyber Center based in Prague. The team supports enterprise clients across multiple industries and operates as a mature, production-grade security organization — not a lab environment or short-term pilot setup.
The Prague office consists of approximately 270 professionals. The broader security operations unit has around 80 people, including roughly 27 engineers responsible for the technical layer — SIEM platforms, detection pipelines, and incident response tooling.
English is used for client-facing communication and documentation; Czech is the day-to-day language within the local team.
Why This Role Exists Now:
The security operations team is expanding. Two new engineers are joining in parallel — one focused on broader SIEM platform operations (separate ad), while this role is aimed at someone with deeper expertise in cloud SIEM architecture, detection engineering at scale, and advanced-level Splunk Enterprise Security or Microsoft Sentinel analytics.
The team already includes senior engineers who designed parts of the current detection architecture, meaning critical knowledge and mentorship are available from day one.
IBM QRadar is entering maintenance mode. If you've spent years on QRadar and know the transition is coming, this is where that transition happens — with a team already running Splunk ES and Sentinel in production, and a clear onboarding path into both.
Job description
Role / Mission:
Your primary responsibility will be detection engineering and SIEM platform ownership — not alert monitoring. You'll design and maintain correlation rules and analytics, ensure incoming data is properly parsed and normalized, and build detection logic that identifies meaningful threats without overwhelming analysts with noise.
Primary platforms include Splunk (including Splunk Enterprise Security) and Microsoft Sentinel. Chronicle / Google SecOps is present in selected client environments, so experience with it is a strong advantage. QRadar and ArcSight still exist in several legacy environments.
Success after 12 months means owning at least one major detection domain. Your analytics rules have measurably reduced false positives, and you can clearly explain why specific rules are tuned the way they are.
Key Responsibilities:
— Design, build, and maintain detection analytics in Splunk ES (correlation searches, risk-based alerting) and/or Microsoft Sentinel (analytics rules at scale, KQL, Fusion detections)
— Manage data ingestion pipelines — onboarding log sources, parsing, normalization, field extractions
— Conduct threat-informed detection reviews: map coverage against MITRE ATT&CK, identify gaps, prioritize improvements
— Support incident response escalations through platform-level investigations — advanced queries, timeline reconstruction
— Contribute to SOAR playbook development and automation logic
— Participate in on-call rotation and lead post-incident reviews related to platform-level issues
What This Role Is NOT:
— Not a Tier 1 analyst role — you'll work upstream from triage, designing the logic that enables effective detection and response
— Not a pure administration role without detection ownership — the expectation is to build and improve, not only configure
— Not an isolated research position — your work directly impacts live enterprise environments, so quality matters from day one
Operating Model:
Standard working hours, no shift work. On-call rotation is shared across the engineering team. Hybrid setup in Prague or fully remote is also possible.
Reports to: Head of Security Engineering
Language: English for client-facing communication and technical documentation; Czech for internal team collaboration
Travel requirements: minimal.
Requirements
What Matters Most:
This role is for someone who thinks in terms of detection logic, not just queries. Three things are essential:
— Advanced SIEM expertise — Splunk Enterprise Security (risk-based alerting, notable event management, ES data models) or Microsoft Sentinel (analytics rules at scale, KQL optimization, UEBA, Fusion), with 3+ years of real production experience
— Detection engineering mindset — understanding of threat models (MITRE ATT&CK), ability to map detection gaps to adversary behavior, and write detection rules that are effective without generating excessive noise
— Strong understanding of data pipelines — knowledge of log source behavior, normalization principles, and the impact of broken parsing rules
English should be strong enough for technical documentation and client-facing reporting.
If your background is QRadar or a single-vendor environment — that's fine. SPL and KQL are tools. We care about how you think about detection, not which query language you currently know.
Nice to Have:
— Chronicle / Google SecOps experience — YARA-L detection rules, UDM data model
— SOAR experience — Splunk SOAR (Phantom), Microsoft Sentinel playbooks, or similar tooling
— Certifications such as Splunk Core Power User / Architect, Microsoft SC-200, GCIA, GCIH
— Threat hunting experience — proactive analysis of historical data for indicators of compromise
Offer & Terms
Compensation & Role Impact:
— Salary: 90 000–130 000 CZK gross/month, depending on seniority and experience
— Access to top-tier enterprise projects typically unavailable to independent contractors
— Strong project governance and established architectural standards
— International environment — not a ticket factory
— Real opportunity to influence and strengthen Prague-based technical leadership
Investing in Your Future:
— Individual training roadmap prepared for every engineer, including paid certifications (Splunk Core/ES, Microsoft SC-200, GCIA, SANS, and others)
— Support for technical bootcamps
— Employee share purchase program (up to 10% of salary)
— Mentoring and coaching
— Private healthcare
— Contributions to life and pension insurance
Work & Flexibility:
— 5 weeks of vacation + sick days
— Company mobile phone
— Employee referral program
Interested? Let's Talk
If this sounds like the kind of challenge you're looking for, apply now.
Throughout the process, you'll work with a senior recruiter who has hands-on IT experience. Straightforward communication, technically grounded discussions, and no unnecessary recruitment overhead.
Send your CV or LinkedIn profile to or connect via linkedin.com/in/jirisoljak
Interview Process:
— Intro call with a SITEQ recruiter — 30 minutes covering the role and client context
— First interview with the team lead — team structure, responsibilities, day-to-day collaboration
— Technical interview with a senior engineer from the security operations team — detection logic, platform depth, real-world scenarios (no trick questions)
— Offer
Please note: this position is open only to candidates who are eligible to work in the EU without visa sponsorship and are able to reside and work in the Czech Republic.