and solutions to ensure consistent highl level of service to customers. Automation & Continuous Improvement Develop scripts and queries (KustoQueryLanguage - KQL, PowerShell, Python) for log analysis. Implement automated remediation workflows where possible. Recommend improvements to architecture based on performance data. Collaboration & Documentation Work closely with engineering … or DevOps support. Strong knowledge of Microsoft Azure services (App Service, SQL Database, Blob Storage, Azure Monitor, Application Insights, Log Analytics). Proficiency in KQL (KustoQueryLanguage) for log analysis. Experience with automation scripting (PowerShell, Python, or Azure Functions). Desirable Familiarity with SIEM tools (Splunk More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Digital Recruitment Company
and solutions to ensure consistent highl level of service to customers. Automation & Continuous Improvement Develop scripts and queries (KustoQueryLanguage - KQL, PowerShell, Python) for log analysis. Implement automated remediation workflows where possible. Recommend improvements to architecture based on performance data. Collaboration & Documentation Work closely with engineering … or DevOps support. Strong knowledge of Microsoft Azure services (App Service, SQL Database, Blob Storage, Azure Monitor, Application Insights, Log Analytics). Proficiency in KQL (KustoQueryLanguage) for log analysis. Experience with automation scripting (PowerShell, Python, or Azure Functions). Desirable Familiarity with SIEM tools (Splunk More ❯
Kingston Upon Thames, England, United Kingdom Hybrid / WFH Options
Reveal Media
and solutions to ensure consistent highl level of service to customers. Automation & Continuous Improvement Develop scripts and queries (KustoQueryLanguage - KQL, PowerShell, Python) for log analysis. Implement automated remediation workflows where possible. Recommend improvements to architecture based on performance data. Collaboration & Documentation Work closely with engineering … or DevOps support. Strong knowledge of Microsoft Azure services (App Service, SQL Database, Blob Storage, Azure Monitor, Application Insights, Log Analytics). Proficiency in KQL (KustoQueryLanguage) for log analysis. Experience with automation scripting (PowerShell, Python, or Azure Functions). Desirable Familiarity with SIEM tools (Splunk More ❯
london (kingston upon thames), south east england, united kingdom Hybrid / WFH Options
Reveal Media
and solutions to ensure consistent highl level of service to customers. Automation & Continuous Improvement Develop scripts and queries (KustoQueryLanguage - KQL, PowerShell, Python) for log analysis. Implement automated remediation workflows where possible. Recommend improvements to architecture based on performance data. Collaboration & Documentation Work closely with engineering … or DevOps support. Strong knowledge of Microsoft Azure services (App Service, SQL Database, Blob Storage, Azure Monitor, Application Insights, Log Analytics). Proficiency in KQL (KustoQueryLanguage) for log analysis. Experience with automation scripting (PowerShell, Python, or Azure Functions). Desirable Familiarity with SIEM tools (Splunk More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
escalated triage and analysis on security events identified by Tier 1 Analysts Apply expertise in SIEM solutions utilising KustoQueryLanguage (KQL) Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action Monitor the threat landscape and document findings on evolving threat … using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
escalated triage and analysis on security events identified by Tier 1 Analysts Apply expertise in SIEM solutions utilising KustoQueryLanguage (KQL) Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action Monitor the threat landscape and document findings on evolving threat … using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
Sentinel log ingestion from critical infrastructure and security tools. Develop cyber risk dashboards in Microsoft Sentinel based on KustoQueryLanguage (KQL) to provide actionable insights. Create custom alerts to detect high-risk cybersecurity events and anomalies. Analyze vulnerability data to identify and prioritize high-risk attack … Information Technology, or related field. Familiarity with SIEM platforms, particularly Microsoft Sentinel. Experience with or willingness to learn KustoQueryLanguage (KQL). Understanding of vulnerability management concepts and tools (e.g., Qualys, Tenable). Strong analytical skills and attention to detail. Ability to communicate technical findings to More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
in using multiple ticketing systems to manage incidents effectively, ensuring service level objectives are adhered to. Experience utilising KustoQueryLanguage (KQL) for log analysis will also be beneficial. This is a full-time on-site role, covering a 24x7 shift pattern, which will come with a … exposure to additional analysis tools such as basic XDR platforms is preferred Able to demonstrate basic knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Able to communicate clearly and efficiently with team members and stakeholders Can communicate simple technical issues to non-technical More ❯
and event management (SIEM) solutions to support the security operations team. They will also be proficient in utilizing KustoQueryLanguage (KQL) for log analysis and gain experience using multiple ticketing systems to manage incidents effectively, ensuring that we adhere to our service level objectives. Responsibilities: Monitor … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate basic knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
and event management (SIEM) solutions to support the security operations team. They will also be proficient in utilizing KustoQueryLanguage (KQL) for log analysis and gain experience using multiple ticketing systems to manage incidents effectively, ensuring that we adhere to our service level objectives. Responsibilities: Monitor … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate basic knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
Experience with Security Orchestration and Automated Response (SOAR) platforms. Preferred qualifications: Experience with Search Processing Language (SPL), KustoQueryLanguage (KQL), YARA-L or similar SIEM query languages. Experience with content engineering inside SIEM platforms (e.g., rule creation, advanced correlation searching, etc.). Knowledge of … and execute/oversee plans to completion. Create and modify SIEM use cases and detection logic, leveraging cyber threat intelligence, written in technology-specific querylanguage or sigma open signature format. Provide expertise for SIEM and other SOC technologies that assist in incident response. Measure and improve alert More ❯
been UK-based for the past 5 years (due to security clearance requirements) Desirable: Familiarity with SIEM tools (Splunk, ELK, Azure Sentinel) Proficient in KQL (KustoQueryLanguage) Microsoft certifications: Azure Administrator Associate (AZ-104), Azure Solutions Architect Expert (AZ-305), Azure Security Engineer Associate (AZ More ❯
been UK-based for the past 5 years (due to security clearance requirements) Desirable: Familiarity with SIEM tools (Splunk, ELK, Azure Sentinel) Proficient in KQL (KustoQueryLanguage) Microsoft certifications: Azure Administrator Associate (AZ-104), Azure Solutions Architect Expert (AZ-305), Azure Security Engineer Associate (AZ More ❯
PAM) and Security Information & Event Management. (SIEM) Good understanding of IT, networking, and end-user computing. Experience writing KustoQueryLanguage (KQL) for Sentinel queries and alerts. Desirable Experience Familiarity with managing network security capabilities such as NAC (Network Access Control), Firewalls, Proxies/VPN, IDS/ More ❯
solutions using Microsoft Fabric. Python data engineering experience. Strong understanding of SQL and NoSQL databases, SQL, CosmosDB and KustoQueryLanguage (KQL). Solid experience of data pipeline development using both cloud and on-premises data sources. Excellent problem-solving, analytical, and communication skills. Strong desire to More ❯
solutions using Microsoft Fabric. Python data engineering experience. Strong understanding of SQL and NoSQL databases, SQL, CosmosDB and KustoQueryLanguage (KQL). Solid experience of data pipeline development using both cloud and on-premises data sources. Excellent problem-solving, analytical, and communication skills. Strong desire to More ❯
experience, including deployment, configuration and component management (Log Analytics workspace, Data Connectors, Analytics rules, Playbooks, etc.) Proficiency in KustoQueryLanguage (KQL) for creating custom queries and detection rules Fundamental engineering technical skills with Microsoft Active Directory and authentication technologies Familiarization with engineering and administration concepts relating More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for More ❯
Engineering (SRE) principles and hands-on experience with Azure DevOps. Proficient in scripting (Bash, PowerShell, Azure CLI), coding (Python, C#, Java), and querying (SQL, KustoQueryLanguage). Familiar with version control systems like GitHub and CI/CD pipelines. Experience with PowerShell, Terraform, Python, Windows command More ❯
and maintain an accurate, consistent, repeatable process for responses to official questions by collecting, consolidating, and preparing written responses to external RFI or internal query from leadership Create and maintain records in compliance with DoD Records Management policies and directives Organize data, establish file structures, and ensure information is … Markup Language (HTML), AJAX, ASP.NET , XML, JavaScript, JQuery, CSS, Microsoft SharePoint Designer, complex SharePoint Workflows, Web Services, REST, Keyword QueryLanguage (KQL), SharePoint Server 2013, and Internet Information Server (IIS). Required: Active Secret clearance is required to start, must be able to obtain a TS/ More ❯
threats, risks, and countermeasures. Familiarity with Linux and Windows operating systems. Basic knowledge of networking, system security , and log analysis. Knowledge of a scripting language like Powershell or Python Ability to practice French OR Dutch at a native level. English proficiency (B2 level minimum) is mandatory too. Nice to … have : Experience with SIEM tools (Sentinel, Splunk, QRadar, etc.), EDR/MDR solutions (Microsoft Defender, CrowdStrike, Trend Micro), data querylanguage like KQL, Regex, Sigma, Yara rules, or prior engagement in cybersecurity platforms and any other private initiatives (TryHackMe, HackTheBox, personal homelabs, CTFs, etc) Human Qualities We are More ❯