Stoke-On-Trent, Staffordshire, West Midlands, United Kingdom
LA International Computer Consultants Ltd
Log Management & Analysis: Oversee the ingestion, parsing, and normalization of security logs from Azure, AWS, M365, and hybrid environments to improve threat visibility. * Security EventCorrelation & Automation: Develop advanced correlation rules, alerts, playbooks, and automation workflows using Sentinel, KQL, and SOAR integrations to enhance threat detection and … enhance security operations. Required Skills & Qualifications * Strong experience designing, managing, and integrating Microsoft Sentinel and Microsoft Defender for Cloud. * Proficiency in SIEM architecture, security eventcorrelation, log ingestion, and cloud security analytics. * Hands-on experience with security automation (SOAR), threat intelligence platforms, and log parsing techniques. * Strong understanding More ❯
Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, eventcorrelation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring More ❯
Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, eventcorrelation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring More ❯
Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing Kusto Query Language (KQL), to perform log analysis, eventcorrelation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action, ensuring More ❯
integration Working knowledge of directory services (e.g. Active Directory, Azure AD), identity federation, and identity lifecycle orchestration Familiarity with logging and monitoring practices, including eventcorrelation, identity-related SIEM alerts, or IAM health dashboards Understanding of identity governance within regulatory frameworks such as ISO 27001, NIST, GDPR, or More ❯
Employment Type: Permanent, Part Time, Work From Home
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Motability Operations
integration Working knowledge of directory services (e.g. Active Directory, Azure AD), identity federation, and identity lifecycle orchestration Familiarity with logging and monitoring practices, including eventcorrelation, identity-related SIEM alerts, or IAM health dashboards Understanding of identity governance within regulatory frameworks such as ISO 27001, NIST, GDPR, or More ❯
Employment Type: Permanent, Part Time, Work From Home
Create and maintain detection rules and logic to identify suspicious activity and potential security threats. Participate in the creation, implementation, and optimisation of SIEM eventcorrelation rules, logic, and content to filter out security events associated with known network behaviour, false positives, and errors. Support the transition of More ❯
Create and maintain detection rules and logic to identify suspicious activity and potential security threats. Participate in the creation, implementation, and optimisation of SIEM eventcorrelation rules, logic, and content to filter out security events associated with known network behaviour, false positives, and errors. Support the transition of More ❯