by Tier 1 Analysts, determining threat severity & advising on initial response actions. * Applying expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, & thorough documentation of security incidents. * Identifying & escalating critical threats to Tier 3 Analysts with detailed analysis for further action … analysis; some exposure to additional analysis tools such as basic XDR platforms. * Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search & filter logs effectively. * Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats & gathering information. * Able to communicate clearly & efficiently … Tier 1 Analysts, determining threat severity and advising on initial response actions. * Applying expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. * Identifying and escalating critical threats to Tier 3 Analysts with detailed analysis for More ❯
issues.' • Provide insights into system downtime, trends, and customer impact. Automation & Continuous Improvement ' • Develop scripts and queries using KustoQueryLanguage (KQL), PowerShell, or Python.' • Implement automated remediation workflows where applicable.' • Suggest architecture enhancements based on performance data analysis. Collaboration & Documentation ' • Work closely with engineering, DevOps, and … Azure services (App Service, SQL Database, Blob Storage, Azure Monitor, Application Insights, Log Analytics).' • Strong proficiency in KustoQueryLanguage (KQL).' • Hands-on experience with automation scripting (PowerShell, Python, or Azure Functions).' • Proven experience in setting up automated alerts, managing dashboards, and generating reports More ❯
and solutions to ensure consistent highl level of service to customers. Automation & Continuous Improvement Develop scripts and queries (KustoQueryLanguage - KQL, PowerShell, Python) for log analysis. Implement automated remediation workflows where possible. Recommend improvements to architecture based on performance data. Collaboration & Documentation Work closely with engineering … or DevOps support. Strong knowledge of Microsoft Azure services (App Service, SQL Database, Blob Storage, Azure Monitor, Application Insights, Log Analytics). Proficiency in KQL (KustoQueryLanguage) for log analysis. Experience with automation scripting (PowerShell, Python, or Azure Functions). Desirable Familiarity with SIEM tools (Splunk More ❯
Kingston Upon Thames, England, United Kingdom Hybrid / WFH Options
Reveal Media
and solutions to ensure consistent highl level of service to customers. Automation & Continuous Improvement Develop scripts and queries (KustoQueryLanguage - KQL, PowerShell, Python) for log analysis. Implement automated remediation workflows where possible. Recommend improvements to architecture based on performance data. Collaboration & Documentation Work closely with engineering … or DevOps support. Strong knowledge of Microsoft Azure services (App Service, SQL Database, Blob Storage, Azure Monitor, Application Insights, Log Analytics). Proficiency in KQL (KustoQueryLanguage) for log analysis. Experience with automation scripting (PowerShell, Python, or Azure Functions). Desirable Familiarity with SIEM tools (Splunk More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
escalated triage and analysis on security events identified by Tier 1 Analysts Apply expertise in SIEM solutions utilising KustoQueryLanguage (KQL) Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action Monitor the threat landscape and document findings on evolving threat … using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
escalated triage and analysis on security events identified by Tier 1 Analysts Apply expertise in SIEM solutions utilising KustoQueryLanguage (KQL) Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action Monitor the threat landscape and document findings on evolving threat … using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
in using multiple ticketing systems to manage incidents effectively, ensuring service level objectives are adhered to. Experience utilising KustoQueryLanguage (KQL) for log analysis will also be beneficial. This is a full-time on-site role, covering a 24x7 shift pattern, which will come with a … exposure to additional analysis tools such as basic XDR platforms is preferred Able to demonstrate basic knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Able to communicate clearly and efficiently with team members and stakeholders Can communicate simple technical issues to non-technical More ❯
and event management (SIEM) solutions to support the security operations team. They will also be proficient in utilizing KustoQueryLanguage (KQL) for log analysis and gain experience using multiple ticketing systems to manage incidents effectively, ensuring that we adhere to our service level objectives. Responsibilities: Monitor … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate basic knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
and event management (SIEM) solutions to support the security operations team. They will also be proficient in utilizing KustoQueryLanguage (KQL) for log analysis and gain experience using multiple ticketing systems to manage incidents effectively, ensuring that we adhere to our service level objectives. Responsibilities: Monitor … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate basic knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
Experience with Security Orchestration and Automated Response (SOAR) platforms. Preferred qualifications: Experience with Search Processing Language (SPL), KustoQueryLanguage (KQL), YARA-L or similar SIEM query languages. Experience with content engineering inside SIEM platforms (e.g., rule creation, advanced correlation searching, etc.). Knowledge of … and execute/oversee plans to completion. Create and modify SIEM use cases and detection logic, leveraging cyber threat intelligence, written in technology-specific querylanguage or sigma open signature format. Provide expertise for SIEM and other SOC technologies that assist in incident response. Measure and improve alert More ❯
PAM) and Security Information & Event Management. (SIEM) Good understanding of IT, networking, and end-user computing. Experience writing KustoQueryLanguage (KQL) for Sentinel queries and alerts. Desirable Experience Familiarity with managing network security capabilities such as NAC (Network Access Control), Firewalls, Proxies/VPN, IDS/ More ❯
solutions using Microsoft Fabric. Python data engineering experience. Strong understanding of SQL and NoSQL databases, SQL, CosmosDB and KustoQueryLanguage (KQL). Solid experience of data pipeline development using both cloud and on-premises data sources. Excellent problem-solving, analytical, and communication skills. Strong desire to More ❯
solutions using Microsoft Fabric. Python data engineering experience. Strong understanding of SQL and NoSQL databases, SQL, CosmosDB and KustoQueryLanguage (KQL). Solid experience of data pipeline development using both cloud and on-premises data sources. Excellent problem-solving, analytical, and communication skills. Strong desire to More ❯
CISSP) are desirable. Technical Proficiency Strong understanding of IT security tools (SIEM, EDR, XDR), threat detection, and log analysis. Familiarity with scripting (Python, PowerShell, KQL) for automation. Benefits Competitive salary with annual reviews. 25 days holiday + option to buy additional leave. Flexible working policies. Enhanced parental benefits. Company pension More ❯
Winchester, Hampshire, United Kingdom Hybrid / WFH Options
Evalian
Defender XDR, and/or other SIEM/XDR solutions. Strong understanding of log collection, parsing, and correlation for security monitoring. Experience in developing KQL queries, custom detection rules. Familiarity with automation and integration tools such as Logic Apps, Power Automate, or other SOAR platforms. Knowledge of cloud security, particularly More ❯
administration and support Strong troubleshooting and incident management skills Familiarity with Azure services (Compute, Storage, Networking) Experience with monitoring tools (Azure Monitor, Log Analytics, KQL) Experience working 1st and 2nd line support responding and triaging incidents against strict SLOs Knowledge of Azure DevOps, CI/CD pipelines, Terraform, and PowerShell More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Gold Group Limited
and technologies. Qualifications Technical Proficiency Strong understanding of IT security tools (SIEM, EDR, XDR), threat detection, and log analysis. Familiarity with scripting (Python, PowerShell, KQL) for automation. Benefits Competitive salary with annual reviews. 25 days holiday + option to buy additional leave. Flexible working policies. Enhanced parental benefits. Company pension More ❯
To be successful as a Security Engineer, you should have the following skills/experience: SIEM experience - Azure Sentinel or Splunk (proficiency in writing KQL and SPL; log sources, ingestion patterns, and correlation rules). DevOps knowledge (Git/BitBucket/GitLab). Security Fundamentals (threat detection, incident response, threat More ❯
To be successful as a Security Engineer, you should have the following skills/experience: SIEM experience - Azure Sentinel or Splunk (proficiency in writing KQL and SPL; log sources, ingestion patterns, and correlation rules). DevOps knowledge (Git/BitBucket/GitLab). Security Fundamentals (threat detection, incident response, threat More ❯
best practices. Proficiency in scripting languages like PowerShell to automate administrative tasks and improve efficiency. Exposure to Azure Log Analytics and aggregating events using KQL would be beneficial. Education: Bachelor's degree in Computer Science, Information Technology, or a related field. Soft Skills: Strong problem-solving abilities, excellent communication skills More ❯
best practices. Proficiency in scripting languages like PowerShell to automate administrative tasks and improve efficiency. Exposure to Azure Log Analytics and aggregating events using KQL would be beneficial. Education: Bachelor's degree in Computer Science, Information Technology, or a related field. Soft Skills: Strong problem-solving abilities, excellent communication skills More ❯
solving skills. Effective communication skills, both written and verbal. Ability to work well in high-pressure situations. Experience using Azure Monitor, App insights and KQL or similar tooling. Experience writing runbooks, and implementation plans and adopting incident management best practices. Strong understanding of environment architecture and release management as part More ❯