Log Management & Analysis: Oversee the ingestion, parsing, and normalization of security logs from Azure, AWS, M365, and hybrid environments to improve threat visibility. * Security EventCorrelation & Automation: Develop advanced correlation rules, alerts, playbooks, and automation workflows using Sentinel, KQL, and SOAR integrations to enhance threat detection and … enhance security operations. Required Skills & Qualifications * Strong experience designing, managing, and integrating Microsoft Sentinel and Microsoft Defender for Cloud. * Proficiency in SIEM architecture, security eventcorrelation, log ingestion, and cloud security analytics. * Hands-on experience with security automation (SOAR), threat intelligence platforms, and log parsing techniques. * Strong understanding More ❯
Gloucestershire, Stoke-On-Trent, Staffordshire, West Midlands
LA International Computer Consultants Ltd
Log Management & Analysis: Oversee the ingestion, parsing, and normalization of security logs from Azure, AWS, M365, and hybrid environments to improve threat visibility. * Security EventCorrelation & Automation: Develop advanced correlation rules, alerts, playbooks, and automation workflows using Sentinel, KQL, and SOAR integrations to enhance threat detection and … enhance security operations. Required Skills & Qualifications * Strong experience designing, managing, and integrating Microsoft Sentinel and Microsoft Defender for Cloud. * Proficiency in SIEM architecture, security eventcorrelation, log ingestion, and cloud security analytics. * Hands-on experience with security automation (SOAR), threat intelligence platforms, and log parsing techniques. * Strong understanding More ❯
Stoke-On-Trent, Staffordshire, West Midlands, United Kingdom
LA International Computer Consultants Ltd
Log Management & Analysis: Oversee the ingestion, parsing, and normalization of security logs from Azure, AWS, M365, and hybrid environments to improve threat visibility. * Security EventCorrelation & Automation: Develop advanced correlation rules, alerts, playbooks, and automation workflows using Sentinel, KQL, and SOAR integrations to enhance threat detection and … enhance security operations. Required Skills & Qualifications * Strong experience designing, managing, and integrating Microsoft Sentinel and Microsoft Defender for Cloud. * Proficiency in SIEM architecture, security eventcorrelation, log ingestion, and cloud security analytics. * Hands-on experience with security automation (SOAR), threat intelligence platforms, and log parsing techniques. * Strong understanding More ❯
Log Management & Analysis: Oversee the ingestion, parsing, and normalization of security logs from Azure, AWS, M365, and hybrid environments to improve threat visibility. Security EventCorrelation & Automation: Develop advanced correlation rules, alerts, playbooks, and automation workflows using Sentinel, KQL, and SOAR integrations to enhance threat detection and … enhance security operations. Required Skills & Qualifications Strong experience designing, managing, and integrating Microsoft Sentinel and Microsoft Defender for Cloud. Proficiency in SIEM architecture, security eventcorrelation, log ingestion, and cloud security analytics. Hands-on experience with security automation (SOAR), threat intelligence platforms, and log parsing techniques. Strong understanding More ❯
Log Management & Analysis: Oversee the ingestion, parsing, and normalization of security logs from Azure, AWS, M365, and hybrid environments to improve threat visibility. Security EventCorrelation & Automation: Develop advanced correlation rules, alerts, playbooks, and automation workflows using Sentinel, KQL, and SOAR integrations to enhance threat detection and … security operations. Required Skills & Qualifications Strong experience designing, managing, and integrating Microsoft Sentinel and Microsoft Defender for Cloud . Proficiency in SIEM architecture, security eventcorrelation, log ingestion, and cloud security analytics . Hands-on experience with security automation (SOAR), threat intelligence platforms, and log parsing techniques . More ❯
Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, eventcorrelation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring More ❯
Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, eventcorrelation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring More ❯
Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, eventcorrelation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring More ❯
Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, eventcorrelation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring More ❯