london, south east england, United Kingdom Hybrid / WFH Options
The Digital Recruitment Company
and solutions to ensure consistent highl level of service to customers. Automation & Continuous Improvement Develop scripts and queries (KustoQueryLanguage - KQL, PowerShell, Python) for log analysis. Implement automated remediation workflows where possible. Recommend improvements to architecture based on performance data. Collaboration & Documentation Work closely with engineering … or DevOps support. Strong knowledge of Microsoft Azure services (App Service, SQL Database, Blob Storage, Azure Monitor, Application Insights, Log Analytics). Proficiency in KQL (KustoQueryLanguage) for log analysis. Experience with automation scripting (PowerShell, Python, or Azure Functions). Desirable Familiarity with SIEM tools (Splunk More ❯
Experience with Security Orchestration and Automated Response (SOAR) platforms. Preferred qualifications: Experience with Search Processing Language (SPL), KustoQueryLanguage (KQL), YARA-L or similar SIEM query languages. Experience with content engineering inside SIEM platforms (e.g., rule creation, advanced correlation searching, etc.). Knowledge of … and execute/oversee plans to completion. Create and modify SIEM use cases and detection logic, leveraging cyber threat intelligence, written in technology-specific querylanguage or sigma open signature format. Provide expertise for SIEM and other SOC technologies that assist in incident response. Measure and improve alert More ❯
of Security Tools: Proficiency in using various security tools and platforms, such as SIEMs, IDS/IPS, and threat intelligence platforms. Proficiency in Writing KQL Queries for Forensics: Strong ability to write and optimize KustoQueryLanguage (KQL) queries for conducting forensic investigations and analysing security events. More ❯
of Security Tools: Proficiency in using various security tools and platforms, such as SIEMs, IDS/IPS, and threat intelligence platforms. Proficiency in Writing KQL Queries for Forensics: Strong ability to write and optimize KustoQueryLanguage (KQL) queries for conducting forensic investigations and analysing security events. More ❯
of Security Tools: Proficiency in using various security tools and platforms, such as SIEMs, IDS/IPS, and threat intelligence platforms. Proficiency in Writing KQL Queries for Forensics: Strong ability to write and optimize KustoQueryLanguage (KQL) queries for conducting forensic investigations and analysing security events. More ❯
of Security Tools: Proficiency in using various security tools and platforms, such as SIEMs, IDS/IPS, and threat intelligence platforms. Proficiency in Writing KQL Queries for Forensics: Strong ability to write and optimize KustoQueryLanguage (KQL) queries for conducting forensic investigations and analysing security events. More ❯
retail clients. Key Responsibilities Advanced threat detection and monitoring using industry-leading tools. Building and tuning detections using KustoQueryLanguage (KQL). Responding to and managing security incidents effectively. Engineering robust detections and performing proactive threat hunts. Supporting security automation and infrastructure-as-code initiatives. Qualifications … re looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like Carbon Black, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and container technologies (e.g., Docker) Threat Hunting, Detection Engineering, Incident More ❯
retail clients. Key Responsibilities Advanced threat detection and monitoring using industry-leading tools. Building and tuning detections using KustoQueryLanguage (KQL). Responding to and managing security incidents effectively. Engineering robust detections and performing proactive threat hunts. Supporting security automation and infrastructure-as-code initiatives. Qualifications … re looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like Carbon Black, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and container technologies (e.g., Docker) Threat Hunting, Detection Engineering, Incident More ❯
retail clients. Key Responsibilities Advanced threat detection and monitoring using industry-leading tools. Building and tuning detections using KustoQueryLanguage (KQL). Responding to and managing security incidents effectively. Engineering robust detections and performing proactive threat hunts. Supporting security automation and infrastructure-as-code initiatives. Qualifications … re looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like Carbon Black, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and container technologies (e.g., Docker) Threat Hunting, Detection Engineering, Incident More ❯
retail clients. Key Responsibilities Advanced threat detection and monitoring using industry-leading tools. Building and tuning detections using KustoQueryLanguage (KQL). Responding to and managing security incidents effectively. Engineering robust detections and performing proactive threat hunts. Supporting security automation and infrastructure-as-code initiatives. Qualifications … re looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like Carbon Black, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and container technologies (e.g., Docker) Threat Hunting, Detection Engineering, Incident More ❯
Sentinel: Development and tuning of custom analytic rules. Workbook creation and dashboarding. Automation using Playbooks and SOAR integration. KustoQueryLanguage (KQL): Writing complex, efficient queries for advanced threat hunting and detection. Correlating data across key tables (e.g., SignInLogs, SecurityEvent, OfficeActivity, DeviceEvents). Developing custom detection rules … optimising performance, and reducing false positives. Supporting Sentinel Workbooks, Alerts, and Playbooks through advanced KQL use. Deep understanding of incident response, threat intelligence and adversary techniques (MITRE ATT&CK framework). Strong knowledge of cloud and hybrid security, particularly within Azure. Additional Requirements: Must hold or be eligible to achieve More ❯
been UK-based for the past 5 years (due to security clearance requirements) Desirable: Familiarity with SIEM tools (Splunk, ELK, Azure Sentinel) Proficient in KQL (KustoQueryLanguage) Microsoft certifications: Azure Administrator Associate (AZ-104), Azure Solutions Architect Expert (AZ-305), Azure Security Engineer Associate (AZ More ❯
been UK-based for the past 5 years (due to security clearance requirements) Desirable: Familiarity with SIEM tools (Splunk, ELK, Azure Sentinel) Proficient in KQL (KustoQueryLanguage) Microsoft certifications: Azure Administrator Associate (AZ-104), Azure Solutions Architect Expert (AZ-305), Azure Security Engineer Associate (AZ More ❯
been UK-based for the past 5 years (due to security clearance requirements) Desirable: Familiarity with SIEM tools (Splunk, ELK, Azure Sentinel) Proficient in KQL (KustoQueryLanguage) Microsoft certifications: Azure Administrator Associate (AZ-104), Azure Solutions Architect Expert (AZ-305), Azure Security Engineer Associate (AZ More ❯
london, south east england, united kingdom Hybrid / WFH Options
Dynamic Search Solutions
Microsoft Sentinel. Experience in building and maintaining workflows with Azure Logic Apps to automate processes. Strong experience in API development and integration. Proficiency in KQL, JSON, and PowerShell. Good written and verbal communication skills. Technical understanding of IT infrastructure – Microsoft 365 suite, Defender XDR, Entra ID (Azure Active Directory), Azure More ❯
west london, south east england, United Kingdom Hybrid / WFH Options
Dynamic Search Solutions
Microsoft Sentinel. Experience in building and maintaining workflows with Azure Logic Apps to automate processes. Strong experience in API development and integration. Proficiency in KQL, JSON, and PowerShell. Good written and verbal communication skills. Technical understanding of IT infrastructure – Microsoft 365 suite, Defender XDR, Entra ID (Azure Active Directory), Azure More ❯
south west london, south east england, United Kingdom Hybrid / WFH Options
Dynamic Search Solutions
Microsoft Sentinel. Experience in building and maintaining workflows with Azure Logic Apps to automate processes. Strong experience in API development and integration. Proficiency in KQL, JSON, and PowerShell. Good written and verbal communication skills. Technical understanding of IT infrastructure – Microsoft 365 suite, Defender XDR, Entra ID (Azure Active Directory), Azure More ❯
west london, south east england, united kingdom Hybrid / WFH Options
Dynamic Search Solutions
Microsoft Sentinel. Experience in building and maintaining workflows with Azure Logic Apps to automate processes. Strong experience in API development and integration. Proficiency in KQL, JSON, and PowerShell. Good written and verbal communication skills. Technical understanding of IT infrastructure – Microsoft 365 suite, Defender XDR, Entra ID (Azure Active Directory), Azure More ❯
south west london, south east england, united kingdom Hybrid / WFH Options
Dynamic Search Solutions
Microsoft Sentinel. Experience in building and maintaining workflows with Azure Logic Apps to automate processes. Strong experience in API development and integration. Proficiency in KQL, JSON, and PowerShell. Good written and verbal communication skills. Technical understanding of IT infrastructure – Microsoft 365 suite, Defender XDR, Entra ID (Azure Active Directory), Azure More ❯
london, south east england, united kingdom Hybrid / WFH Options
KPMG UK
exploits, malware, ransomware, etc. their creation and activation and detection methods. • Knowledge of web application architecture and system administration. • Experienced building complex custom RQL, KQL or SQL queries. • Experienced with Microsoft Azure, AWS or GCP installation, configuration, and administration of security features and services. • Programming experience with Python or PowerShell More ❯
south west london, south east england, United Kingdom Hybrid / WFH Options
KPMG UK
exploits, malware, ransomware, etc. their creation and activation and detection methods. • Knowledge of web application architecture and system administration. • Experienced building complex custom RQL, KQL or SQL queries. • Experienced with Microsoft Azure, AWS or GCP installation, configuration, and administration of security features and services. • Programming experience with Python or PowerShell More ❯
west london, south east england, United Kingdom Hybrid / WFH Options
KPMG UK
exploits, malware, ransomware, etc. their creation and activation and detection methods. • Knowledge of web application architecture and system administration. • Experienced building complex custom RQL, KQL or SQL queries. • Experienced with Microsoft Azure, AWS or GCP installation, configuration, and administration of security features and services. • Programming experience with Python or PowerShell More ❯
west london, south east england, united kingdom Hybrid / WFH Options
KPMG UK
exploits, malware, ransomware, etc. their creation and activation and detection methods. • Knowledge of web application architecture and system administration. • Experienced building complex custom RQL, KQL or SQL queries. • Experienced with Microsoft Azure, AWS or GCP installation, configuration, and administration of security features and services. • Programming experience with Python or PowerShell More ❯
south west london, south east england, united kingdom Hybrid / WFH Options
KPMG UK
exploits, malware, ransomware, etc. their creation and activation and detection methods. • Knowledge of web application architecture and system administration. • Experienced building complex custom RQL, KQL or SQL queries. • Experienced with Microsoft Azure, AWS or GCP installation, configuration, and administration of security features and services. • Programming experience with Python or PowerShell More ❯
actions) Oversee threat detection and monitoring (via SIEM tools) Drive vulnerability management Report security posture via dashboards and metrics Use Microsoft Sentinel, Defender, and KQL for threat detection and investigation Lead and develop SOC analysts Requirements: Degree in Computer Science/IT or relevant industry certifications such as GSOC, CPSA …/400. Proven experience managing a SOC/Security Operations function within housing association/public sector. Strong experience with Microsoft Sentinel, Kusto (KQL), Azure Defender tools Hands-on incident response, threat monitoring, and S... More ❯