AI Developer (Semantic Kernel) AI Developer (Semantic Kernel) Locations: Sentinel Building, Glasgow Time Type: Full time Posted On: Gestern Job Requisition ID: JR15784 We're a global leader in providing energy solutions that help businesses grow and communities thrive. We work as a team and we're proud … Microsoft's Semantic Kernel, ensuring high performance and scalability. Data Science & Engineering: Handle large datasets and implement data pipelines, utilizing Python, SQL, and Azure data services for preprocessing and transformation. ETL & Real-Time Processing: Implement ETL pipelines and real-time data processing to support AI solutions. AI Solution … Integration: Enhance enterprise applications with AI services like Azure OpenAI and Cognitive Services for automation and analytics. API Development: Create secure and efficient RESTful APIs for AI and enterprise applications, deploying solutions using Azure services (AKS, Azure Container Apps). Version Control & DevOps: Use More ❯
concepts, including IP addressing and basic network protocols Advanced knowledge of Windows and Linux operating environments Competence in using SIEM solutions (e.g., ArcSight, AzureSentinel) for monitoring and log analysis Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search and filter logs effectively. More ❯
concepts, including IP addressing and basic network protocols Advanced knowledge of Windows and Linux operating environments Competence in using SIEM solutions (e.g., ArcSight, AzureSentinel) for monitoring and log analysis Able to demonstrate proficient knowledge using Kusto Query Language (KQL) to search and filter logs effectively. More ❯
teams to ensure a secure environment. To be successful as a Security Engineer, you should have the following skills/experience: SIEM experience - AzureSentinel or Splunk (proficiency in writing KQL and SPL; log sources, ingestion patterns, and correlation rules). DevOps knowledge (Git/BitBucket More ❯
Threat Detection - Specializing in SIEM tools to identify anomalies across cloud and data center environments, while developing and maintaining security monitoring during the Azure transition. Incident Response & Threat Hunting - Assisting in containment, eradication, and recovery of incidents, proactively hunting for threats, and mitigating operational risks. Risk & Threat Management … of IT domains like OS, databases, networks, or applications It's a bonus if you have: Qualifications in Cyber Security Knowledge of MicrosoftSentinel and MicrosoftAzure (including certifications such as AZ-900, SC-900, SC-200 or AZ-500) If this role is of interest More ❯