investment bank based in London - Contract - Hybrid Inside IR35 - umbrella Key Responsibilities SIEM Management & Optimization: Design, implement, and maintain Microsoft Sentinel workspaces, connectors, analytics rules, and playbooks Develop advanced KQL queries for threat hunting and reporting Optimize SIEM performance, cost, and data retention policies Troubleshoot log ingestion and parsing issues Log Source Integration: Onboard and configure critical log sources (AD … security tools Help define and measure control effectiveness Required Skills & Experience 3+ years in a Security Engineer, SOC Analyst, or similar role Hands-on experience with Microsoft Sentinel and KQL Strong knowledge of Active Directory, Windows/Linux systems, and cloud platforms (Azure, AWS, GCP) Proficiency in scripting (PowerShell, Python) Familiarity with security frameworks (MITRE ATT&CK, NIST, Kill Chain More ❯
About the Role: We’re a leading Managed Service Provider (MSP) delivering cutting-edge IT and security solutions to businesses worldwide. Our mission is to protect digital assets through proactive security measures, advanced threat intelligence, and world-class support. Join More ❯
health and reliability. Provide recommendations and solutions to ensure consistent highl level of service to customers. Automation & Continuous Improvement Develop scripts and queries (KustoQueryLanguage - KQL, PowerShell, Python) for log analysis. Implement automated remediation workflows where possible. Recommend improvements to architecture based on performance data. Collaboration & Documentation Work closely with engineering, DevOps, and customer support teams … in cloud monitoring, data analysis, or DevOps support. Strong knowledge of Microsoft Azure services (App Service, SQL Database, Blob Storage, Azure Monitor, Application Insights, Log Analytics). Proficiency in KQL (KustoQueryLanguage) for log analysis. Experience with automation scripting (PowerShell, Python, or Azure Functions). Desirable Familiarity with SIEM tools (Splunk, ELK, Azure Sentinel) Microsoft Certified More ❯
City of London, London, United Kingdom Hybrid / WFH Options
The Digital Recruitment Company
health and reliability. Provide recommendations and solutions to ensure consistent highl level of service to customers. Automation & Continuous Improvement Develop scripts and queries (KustoQueryLanguage - KQL, PowerShell, Python) for log analysis. Implement automated remediation workflows where possible. Recommend improvements to architecture based on performance data. Collaboration & Documentation Work closely with engineering, DevOps, and customer support teams … in cloud monitoring, data analysis, or DevOps support. Strong knowledge of Microsoft Azure services (App Service, SQL Database, Blob Storage, Azure Monitor, Application Insights, Log Analytics). Proficiency in KQL (KustoQueryLanguage) for log analysis. Experience with automation scripting (PowerShell, Python, or Azure Functions). Desirable Familiarity with SIEM tools (Splunk, ELK, Azure Sentinel) Microsoft Certified More ❯
Proactively detect incidents and escalate them before customers feel the impact Build historical trend reports beyond Azure's native 90-day data retention Analyse logs and performance data using KQL, providing insights and actionable recommendations Automate remediation workflows using PowerShell, Python or Azure Functions Work closely with engineering and DevOps to resolve incidents quickly Document processes, support setup of a … traits, and experience: 3+ years of experience in cloud monitoring, data analysis, or DevOps support Deep familiarity with Azure services including App Service, SQL, Blob Storage Strong command of KQL (KustoQueryLanguage) for log and telemetry analysis Experience setting up automated alerts and building dashboards Working knowledge of automation (PowerShell, Python, or similar) Analytical mindset with More ❯
and orchestrations that reduce manual effort and improve speed and accuracy in security operations. - Tell Stories with Data: Use tools like Jupyter Notebooks, KustoQueryLanguage (KQL), and Python to query and visualize large-scale security datasets. Translate telemetry into insights and share narratives that influence decision-making across engineering and leadership teams. - Support Compliance and More ❯
Kingston Upon Thames, Surrey, England, United Kingdom
BOSS Professional Services LTD
Azure services (App Service, SQL Database, Blob Storage, Azure Monitor, Application Insights, Log Analytics). Previous experience of setting up automated alerts, managing dashboards, and generating reports. Proficiency in KQL (KustoQueryLanguage) for log analysis. Experience with automation scripting (PowerShell, Python, or Azure Functions). As an experienced Azure Cloud Monitoring and Data Analyst you will More ❯
ensure compliance with internal policies, standards, and industry best practices. Key Responsibilities: Manage and optimize Microsoft Sentinel SIEM, including data connectors, detection rules, and workbooks. Develop and fine-tune KQL queries for threat hunting and reporting. Onboard and configure critical log sources (e.g. AD, firewalls, cloud, servers). Build and enhance threat detection use cases and monitoring controls. Monitor systems More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Hunter Bond
ensure compliance with internal policies, standards, and industry best practices. Key Responsibilities: Manage and optimize Microsoft Sentinel SIEM, including data connectors, detection rules, and workbooks. Develop and fine-tune KQL queries for threat hunting and reporting. Onboard and configure critical log sources (e.g. AD, firewalls, cloud, servers). Build and enhance threat detection use cases and monitoring controls. Monitor systems More ❯
NIST, ISO 27001, Zero Trust. Extensive experience with Windows and Linux hardening. Skilled in protocol analysis, network architecture, and infrastructure design. Technical Toolkit: Strong command of Azure Log Analytics, KQL, and Azure-based security tools. Scripting: Python, PowerShell, Shell. Experience with IDS/IPS, firewalls, SIEMs, and vulnerability management tools. Strong grasp of Active Directory, Azure AD, and identity access More ❯
NIST, ISO 27001, Zero Trust. Extensive experience with Windows and Linux hardening. Skilled in protocol analysis, network architecture, and infrastructure design. Technical Toolkit: Strong command of Azure Log Analytics, KQL, and Azure-based security tools. Scripting: Python, PowerShell, Shell. Experience with IDS/IPS, firewalls, SIEMs, and vulnerability management tools. Strong grasp of Active Directory, Azure AD, and identity access More ❯
Jobs Search Type All Job Area All Sentinel SecOps Engineer - Sentinel, KQL, EDR, SOC Tooling London - Hybrid (3 days in the office) £450 - £500 p/day Outside IR35 Sentinel SecOps Engineer - Sentinel, KQL, EDR, SOC Tooling - London (3 days onsite) - £450 - £500 p/day Outside IR35 I am working with an exceptional Microsoft Security Solution Provider, and they … of them. You will need to build all the analytical rules within the log sources and help to support the entire estate. It is essential that you have exceptional KQL skills, not just be able to follow code, but create it from scratch and spot errors and changes in code as and when you review it. They need someone who … days later in the contract, but this is not guaranteed. Required: Exposure working with a previous managed security provider or within an MSSP environment Strong working knowledge of KQL (essential) Experience using SOC tooling (SIEM and EDR solutions) (essential) Previous experience working within financial services Experience using ITSM tools Knowledge of the phases in incident response and Cyber Kill Chain More ❯