by Tier 1 Analysts, determining threat severity & advising on initial response actions. * Applying expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, & thorough documentation of security incidents. * Identifying & escalating critical threats to Tier 3 Analysts with detailed analysis for further action … analysis; some exposure to additional analysis tools such as basic XDR platforms. * Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search & filter logs effectively. * Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats & gathering information. * Able to communicate clearly & efficiently … Tier 1 Analysts, determining threat severity and advising on initial response actions. * Applying expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. * Identifying and escalating critical threats to Tier 3 Analysts with detailed analysis for More ❯
Provide insights into system downtime, trends, and customer impact . Automation & Continuous Improvement Develop scripts and queries using KustoQueryLanguage (KQL), PowerShell, or Python . Implement automated remediation workflows where applicable. Suggest architecture enhancements based on performance data analysis. Collaboration & Documentation Work closely with engineering, DevOps … Azure services (App Service, SQL Database, Blob Storage, Azure Monitor, Application Insights, Log Analytics). Strong proficiency in KustoQueryLanguage (KQL) . Hands-on experience with automation Scripting (PowerShell, Python, or Azure Functions). Proven experience in setting up automated alerts, managing dashboards, and generating reports More ❯
and solutions to ensure consistent highl level of service to customers. Automation & Continuous Improvement Develop scripts and queries (KustoQueryLanguage - KQL, PowerShell, Python) for log analysis. Implement automated remediation workflows where possible. Recommend improvements to architecture based on performance data. Collaboration & Documentation Work closely with engineering … or DevOps support. Strong knowledge of Microsoft Azure services (App Service, SQL Database, Blob Storage, Azure Monitor, Application Insights, Log Analytics). Proficiency in KQL (KustoQueryLanguage) for log analysis. Experience with automation scripting (PowerShell, Python, or Azure Functions). Desirable Familiarity with SIEM tools (Splunk More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Digital Recruitment Company
and solutions to ensure consistent highl level of service to customers. Automation & Continuous Improvement Develop scripts and queries (KustoQueryLanguage - KQL, PowerShell, Python) for log analysis. Implement automated remediation workflows where possible. Recommend improvements to architecture based on performance data. Collaboration & Documentation Work closely with engineering … or DevOps support. Strong knowledge of Microsoft Azure services (App Service, SQL Database, Blob Storage, Azure Monitor, Application Insights, Log Analytics). Proficiency in KQL (KustoQueryLanguage) for log analysis. Experience with automation scripting (PowerShell, Python, or Azure Functions). Desirable Familiarity with SIEM tools (Splunk More ❯
Kingston Upon Thames, England, United Kingdom Hybrid / WFH Options
Reveal Media
and solutions to ensure consistent highl level of service to customers. Automation & Continuous Improvement Develop scripts and queries (KustoQueryLanguage - KQL, PowerShell, Python) for log analysis. Implement automated remediation workflows where possible. Recommend improvements to architecture based on performance data. Collaboration & Documentation Work closely with engineering … or DevOps support. Strong knowledge of Microsoft Azure services (App Service, SQL Database, Blob Storage, Azure Monitor, Application Insights, Log Analytics). Proficiency in KQL (KustoQueryLanguage) for log analysis. Experience with automation scripting (PowerShell, Python, or Azure Functions). Desirable Familiarity with SIEM tools (Splunk More ❯
london (kingston upon thames), south east england, united kingdom Hybrid / WFH Options
Reveal Media
and solutions to ensure consistent highl level of service to customers. Automation & Continuous Improvement Develop scripts and queries (KustoQueryLanguage - KQL, PowerShell, Python) for log analysis. Implement automated remediation workflows where possible. Recommend improvements to architecture based on performance data. Collaboration & Documentation Work closely with engineering … or DevOps support. Strong knowledge of Microsoft Azure services (App Service, SQL Database, Blob Storage, Azure Monitor, Application Insights, Log Analytics). Proficiency in KQL (KustoQueryLanguage) for log analysis. Experience with automation scripting (PowerShell, Python, or Azure Functions). Desirable Familiarity with SIEM tools (Splunk More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
escalated triage and analysis on security events identified by Tier 1 Analysts Apply expertise in SIEM solutions utilising KustoQueryLanguage (KQL) Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action Monitor the threat landscape and document findings on evolving threat … using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
escalated triage and analysis on security events identified by Tier 1 Analysts Apply expertise in SIEM solutions utilising KustoQueryLanguage (KQL) Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action Monitor the threat landscape and document findings on evolving threat … using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
Sentinel log ingestion from critical infrastructure and security tools. Develop cyber risk dashboards in Microsoft Sentinel based on KustoQueryLanguage (KQL) to provide actionable insights. Create custom alerts to detect high-risk cybersecurity events and anomalies. Analyze vulnerability data to identify and prioritize high-risk attack … Information Technology, or related field. Familiarity with SIEM platforms, particularly Microsoft Sentinel. Experience with or willingness to learn KustoQueryLanguage (KQL). Understanding of vulnerability management concepts and tools (e.g., Qualys, Tenable). Strong analytical skills and attention to detail. Ability to communicate technical findings to More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. If you'd More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
in using multiple ticketing systems to manage incidents effectively, ensuring service level objectives are adhered to. Experience utilising KustoQueryLanguage (KQL) for log analysis will also be beneficial. This is a full-time on-site role, covering a 24x7 shift pattern, which will come with a … exposure to additional analysis tools such as basic XDR platforms is preferred Able to demonstrate basic knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Able to communicate clearly and efficiently with team members and stakeholders Can communicate simple technical issues to non-technical More ❯
and event management (SIEM) solutions to support the security operations team. They will also be proficient in utilizing KustoQueryLanguage (KQL) for log analysis and gain experience using multiple ticketing systems to manage incidents effectively, ensuring that we adhere to our service level objectives. Responsibilities: Monitor … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate basic knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
and event management (SIEM) solutions to support the security operations team. They will also be proficient in utilizing KustoQueryLanguage (KQL) for log analysis and gain experience using multiple ticketing systems to manage incidents effectively, ensuring that we adhere to our service level objectives. Responsibilities: Monitor … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate basic knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
Experience with Security Orchestration and Automated Response (SOAR) platforms. Preferred qualifications: Experience with Search Processing Language (SPL), KustoQueryLanguage (KQL), YARA-L or similar SIEM query languages. Experience with content engineering inside SIEM platforms (e.g., rule creation, advanced correlation searching, etc.). Knowledge of … and execute/oversee plans to completion. Create and modify SIEM use cases and detection logic, leveraging cyber threat intelligence, written in technology-specific querylanguage or sigma open signature format. Provide expertise for SIEM and other SOC technologies that assist in incident response. Measure and improve alert More ❯
been UK-based for the past 5 years (due to security clearance requirements) Desirable: Familiarity with SIEM tools (Splunk, ELK, Azure Sentinel) Proficient in KQL (KustoQueryLanguage) Microsoft certifications: Azure Administrator Associate (AZ-104), Azure Solutions Architect Expert (AZ-305), Azure Security Engineer Associate (AZ More ❯
been UK-based for the past 5 years (due to security clearance requirements) Desirable: Familiarity with SIEM tools (Splunk, ELK, Azure Sentinel) Proficient in KQL (KustoQueryLanguage) Microsoft certifications: Azure Administrator Associate (AZ-104), Azure Solutions Architect Expert (AZ-305), Azure Security Engineer Associate (AZ More ❯
PAM) and Security Information & Event Management. (SIEM) Good understanding of IT, networking, and end-user computing. Experience writing KustoQueryLanguage (KQL) for Sentinel queries and alerts. Desirable Experience Familiarity with managing network security capabilities such as NAC (Network Access Control), Firewalls, Proxies/VPN, IDS/ More ❯
solutions using Microsoft Fabric. Python data engineering experience. Strong understanding of SQL and NoSQL databases, SQL, CosmosDB and KustoQueryLanguage (KQL). Solid experience of data pipeline development using both cloud and on-premises data sources. Excellent problem-solving, analytical, and communication skills. Strong desire to More ❯
solutions using Microsoft Fabric. Python data engineering experience. Strong understanding of SQL and NoSQL databases, SQL, CosmosDB and KustoQueryLanguage (KQL). Solid experience of data pipeline development using both cloud and on-premises data sources. Excellent problem-solving, analytical, and communication skills. Strong desire to More ❯
experience, including deployment, configuration and component management (Log Analytics workspace, Data Connectors, Analytics rules, Playbooks, etc.) Proficiency in KustoQueryLanguage (KQL) for creating custom queries and detection rules Fundamental engineering technical skills with Microsoft Active Directory and authentication technologies Familiarization with engineering and administration concepts relating More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for More ❯
Engineering (SRE) principles and hands-on experience with Azure DevOps. Proficient in scripting (Bash, PowerShell, Azure CLI), coding (Python, C#, Java), and querying (SQL, KustoQueryLanguage). Familiar with version control systems like GitHub and CI/CD pipelines. Experience with PowerShell, Terraform, Python, Windows command More ❯