and monitoring tools (Azure Monitor, Log Analytics). Proven experience implementing Microsoft Sentinel: connecting data sources, building analytics rules, creating dashboards, and writing KQL queries. Understanding incident response, security eventcorrelation, and automation via Logic Apps. Solid understanding of cybersecurity principles: Zero Trust, Conditional Access, MFA, identity protection, and secure score improvement. Intune/Endpoint Management: Deployment and More ❯
escalate incidents that may cause ongoing and immediate impact to the environment and analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information. Perform eventcorrelation to using information gathered for a variety of sources withing the enterprise to gain situational awareness and determine the effectiveness of an observed attack. Conduct research, analysis … and correlation across a wide variety of all source data sets (indications and warnings). Notify the government of suspected cyber incidents and articulate the event's history, status, and potential impact for further action in accordance with the government's cyber incident response plan. Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities. Knowledge of More ❯
skills in areas such as alerting, incident response, and log analysis. Comfortable working hands-on with detection and monitoring technologies such as Microsoft Sentinel. Strong understanding of log pipelines, eventcorrelation, and alert tuning. Familiarity with TCP/IP networking, proxies, DNS, endpoint telemetry, and OS-level security controls. Experience working within shift-based or 24/ More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Proactive Appointments
skills in areas such as alerting, incident response, and log analysis. Comfortable working hands-on with detection and monitoring technologies such as Microsoft Sentinel. Strong understanding of log pipelines, eventcorrelation, and alert tuning. Familiarity with TCP/IP networking, proxies, DNS, endpoint telemetry, and OS-level security controls. Experience working within shift-based or 24/ More ❯