skills? Knowledge of detection rule development, covering tools (such as SIEM, EDRs) and industry frameworks (such as MITRE ATT&CK) Expert proficiency in Python, Kusto, or other scripting language Experience working as a security analyst or incident responder (in a SOC/CSIRT/on-call setup) Experience more »
detection rule development, covering tools (such as SIEM, EDRs) and industry frameworks (such as MITRE ATT&CK) Nice-to-have Expert proficiency in Python, Kusto, or other scripting language Experience working as a security analyst or incident responder (in a SOC/CSIRT/on-call setup) Experience more »
Elastic Stack Proficiency: Demonstrate deep knowledge and hands-on experience with the Elastic Stack (Elasticsearch, Logstash, Kibana) for security data analysis and threat intelligence. KQLQuery Development: Create advanced KustoQueryLanguage (KQL) queries to proactively identify potential security threats within Azure environments. Harness the power more »
include: * Investigating cloud data and producing reports * Analysis of vehicle data to understand trends and root cause * Use advanced MS Excel techniques including Power Query, Power Pivot and Power Automation to manipulate cloud data and produce reports * Extract requested data from the cloud and identify information Background and experience … Analyst include : * Ideally Degree qualified or equivalent in a relevant engineering discipline * Proficient in MySQL, Tableau and Statistics * Experience of Power tools ie Power Query, Power Pivot, Power Automation, Power apps * Knowledge of Data visualisation tools * Competent with PC applications including Microsoft Office * Experience of MS Azure OMS & KustoQuery is desirable but not essential A valid UK/European driving licence is essential and flexibility regarding working practice and working hours is required. To meet with current legislation, right to work checks will be carried out to ensure candidates are eligible to work within the UK. more »
solving skills. Effective communication skills, both written and verbal. Ability to work well in high-pressure situations. Experience using Azure Monitor, App insights and KQL or similar tooling. Experience writing runbooks, and implementation plans and adopting incident management best practices. Strong understanding of environment architecture and release management as part more »
solving skills. Effective communication skills, both written and verbal. Ability to work well in high-pressure situations. Experience using Azure Monitor, App insights and KQL or similar tooling. Experience writing runbooks, and implementation plans and adopting incident management best practices. Strong understanding of environment architecture and release management as part more »
performance. Qualifications: Skills: Proficiency in using SIEM tools, especially Microsoft Sentinel and the Microsoft Defender suite. Proficiency in KustoQueryLanguage (KQL). Experience with the creation, configuration and use of Playbooks, Notebooks and Workbooks. Strong understanding of advanced cybersecurity concepts, threat landscape, and attack methodologies. Demonstrated more »