Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. If you'd More ❯
addressing, and traffic flow, with advanced knowledge of Windows and Linux systems. Proficient in using SIEM tools like ArcSight and Azure Sentinel; experienced with KQL and basic XDR platforms. Familiar with OSINT techniques for threat intelligence and incident investigation. Holds or is working toward relevant certifications such as CISSP, CySA+ More ❯
AWS, M365, and hybrid environments to improve threat visibility. * Security Event Correlation & Automation: Develop advanced correlation rules, alerts, playbooks, and automation workflows using Sentinel, KQL, and SOAR integrations to enhance threat detection and response capabilities. * Cloud Threat Protection: Monitor, analyse, and strengthen security postures across cloud platforms, utilising Defender for … Knowledge of Azure, AWS, M365, hybrid environments, and cloud security frameworks (CIS, NIST, ISO 27001, etc.). * Experience with scripting and automation (PowerShell, Python, KQL, or similar languages) to enhance security operations. * Excellent problem-solving, analytical, and communication skills with the ability to effectively influence others. * Ability to adapt quickly More ❯
AWS, M365, and hybrid environments to improve threat visibility. Security Event Correlation & Automation: Develop advanced correlation rules, alerts, playbooks, and automation workflows using Sentinel, KQL, and SOAR integrations to enhance threat detection and response capabilities. Cloud Threat Protection: Monitor, analyse, and strengthen security postures across cloud platforms, utilising Defender for … Knowledge of Azure, AWS, M365, hybrid environments, and cloud security frameworks (CIS, NIST, ISO 27001, etc.) . Experience with scripting and automation (PowerShell, Python, KQL, or similar languages) to enhance security operations. Excellent problem-solving, analytical, and communication skills with the ability to effectively influence others. Ability to adapt quickly More ❯
AWS, M365, and hybrid environments to improve threat visibility. Security Event Correlation & Automation: Develop advanced correlation rules, alerts, playbooks, and automation workflows using Sentinel, KQL, and SOAR integrations to enhance threat detection and response capabilities. Cloud Threat Protection: Monitor, analyse, and strengthen security postures across cloud platforms, utilising Defender for … Knowledge of Azure, AWS, M365, hybrid environments, and cloud security frameworks (CIS, NIST, ISO 27001, etc.). Experience with scripting and automation (PowerShell, Python, KQL, or similar languages) to enhance security operations. Excellent problem-solving, analytical, and communication skills with the ability to effectively influence others. Ability to adapt quickly More ❯
Coventry, West Midlands, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
data rollback planning, and stakeholder reporting. Utilities/SCADA/SAP PM/GIS domain experience is a strong plus . Desirable Skills Python, Kusto, Azure Event Hub, IoT Hub, Azure Kafka, ADX. MDM tools: Informatica, Profisee. Knowledge of GDPR, data privacy, and regulatory frameworks. More ❯