london (kingston upon thames), south east england, united kingdom Hybrid / WFH Options
Reveal Media
and solutions to ensure consistent highl level of service to customers. Automation & Continuous Improvement Develop scripts and queries (KustoQueryLanguage - KQL, PowerShell, Python) for log analysis. Implement automated remediation workflows where possible. Recommend improvements to architecture based on performance data. Collaboration & Documentation Work closely with engineering … or DevOps support. Strong knowledge of Microsoft Azure services (App Service, SQL Database, Blob Storage, Azure Monitor, Application Insights, Log Analytics). Proficiency in KQL (KustoQueryLanguage) for log analysis. Experience with automation scripting (PowerShell, Python, or Azure Functions). Desirable Familiarity with SIEM tools (Splunk More ❯
identified by Tier 1 Analysts, assessing threat severity and advising on initial response actions. Utilize SIEM solutions with KustoQueryLanguage (KQL) for log analysis, event correlation, and documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for further action … mechanisms. Experience with SIEM solutions (e.g., ArcSight, Azure Sentinel) and analysis tools such as XDR platforms. Proficient in KustoQueryLanguage (KQL) for log searching and filtering. Knowledge of OSINT techniques for threat identification and information gathering. Effective communication skills for internal and external stakeholders, with the More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for … for monitoring and log analysis; some exposure to additional analysis tools such as basic XDR platforms. Proficient in KustoQueryLanguage (KQL) for log searches and filtering. Familiar with OSINT techniques to aid in threat identification and information gathering. Effective communication skills to collaborate with team members More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. • Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. • Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for … analysis; some exposure to additional analysis tools such as basic XDR platforms. • Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. • Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. • Able to communicate More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. • Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. • Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for … analysis; some exposure to additional analysis tools such as basic XDR platforms. • Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. • Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. • Able to communicate More ❯
by Tier 1 Analysts, determining threat severity & advising on initial response actions. Applying expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, & thorough documentation of security incidents. Identifying & escalating critical threats to Tier 3 Analysts with detailed analysis for further action … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search & filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats & gathering information. Able to communicate clearly & efficiently More ❯
by Tier 1 Analysts, determining threat severity & advising on initial response actions. * Applying expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, & thorough documentation of security incidents. * Identifying & escalating critical threats to Tier 3 Analysts with detailed analysis for further action … analysis; some exposure to additional analysis tools such as basic XDR platforms. * Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search & filter logs effectively. * Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats & gathering information. * Able to communicate clearly & efficiently More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. Applying expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identifying and escalating critical threats to Tier 3 Analysts with detailed analysis for … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
Tier 1 Analysts, determining threat severity and advising on initial response actions. Apply expertise in SIEM solutions utilizing KustoQueryLanguage (KQL), to perform log analysis, event correlation, and thorough documentation of security incidents. Identify and escalate critical threats to Tier 3 Analysts with detailed analysis for … analysis; some exposure to additional analysis tools such as basic XDR platforms. Able to demonstrate proficient knowledge using KustoQueryLanguage (KQL) to search and filter logs effectively. Familiar with open-source intelligence (OSINT) techniques to aid in identifying potential threats and gathering information. Able to communicate More ❯
Experience with Security Orchestration and Automated Response (SOAR) platforms. Preferred qualifications: Experience with Search Processing Language (SPL), KustoQueryLanguage (KQL), YARA-L or similar SIEM query languages. Experience with content engineering inside SIEM platforms (e.g., rule creation, advanced correlation searching, etc.). Knowledge of … and execute/oversee plans to completion. Create and modify SIEM use cases and detection logic, leveraging cyber threat intelligence, written in technology-specific querylanguage or sigma open signature format. Provide expertise for SIEM and other SOC technologies that assist in incident response. Measure and improve alert More ❯
retail clients. Key Responsibilities Advanced threat detection and monitoring using industry-leading tools. Building and tuning detections using KustoQueryLanguage (KQL). Responding to and managing security incidents effectively. Engineering robust detections and performing proactive threat hunts. Supporting security automation and infrastructure-as-code initiatives. Qualifications … re looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like Carbon Black, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and container technologies (e.g., Docker) Threat Hunting, Detection Engineering, Incident More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
Graphicsunlimited
/Sentinel. Debugging and troubleshooting Microsoft 365 workloads and custom solutions. Using the following languages: PowerShell/CLI, KustoQueryLanguage (KQL), YAML and in infrastructure as code language such as Bicep/ARM. You and your role We're looking for a Senior Infrastructure Engineer More ❯
Newcastle upon Tyne, England, United Kingdom Hybrid / WFH Options
Graphicsunlimited
/Sentinel. Debugging and troubleshooting Microsoft 365 workloads and custom solutions. Using the following languages: PowerShell/CLI, KustoQueryLanguage (KQL), YAML and in infrastructure as code language such as Bicep/ARM. You and your role We're looking for a Senior Infrastructure Engineer More ❯
experienced candidates: Cyber Security Degree. Proven time management and project management skills. Hands-on experience in SOC operations and advanced SIEM tools. Proficiency in KQL (KustoQueryLanguage) within SIEM platforms. Demonstrated ability to execute threat-hunting activities and lead incident response. Exceptional communication skills, with the More ❯
/7 rota, specifically in an established IT or Security function. Working knowledge of SIEM tools. Scripting capability, particularly using PowerShell, Bash, and KQL (KustoQueryLanguage) for automation, scripting, and querying in Microsoft Sentinel and Defender. Experience with security and monitoring tools such as Zscaler, Microsoft More ❯
/7 rota, specifically in an established IT or Security function. Working knowledge of SIEM tools. Scripting capability, particularly using PowerShell, Bash, and KQL (KustoQueryLanguage) for automation, scripting, and querying in Microsoft Sentinel and Defender. Experience with security and monitoring tools such as Zscaler, Microsoft More ❯
/7 rota, specifically in an established IT or Security function. Working knowledge of SIEM tools. Scripting capability, particularly using PowerShell, Bash, and KQL (KustoQueryLanguage) for automation, scripting, and querying in Microsoft Sentinel and Defender. Experience with security and monitoring tools such as Zscaler, Microsoft More ❯
watford, hertfordshire, east anglia, united kingdom
PayPoint plc
/7 rota, specifically in an established IT or Security function. Working knowledge of SIEM tools. Scripting capability, particularly using PowerShell, Bash, and KQL (KustoQueryLanguage) for automation, scripting, and querying in Microsoft Sentinel and Defender. Experience with security and monitoring tools such as Zscaler, Microsoft More ❯
/7 rota, specifically in an established IT or Security function. Working knowledge of SIEM tools. Scripting capability, particularly using PowerShell, Bash, and KQL (KustoQueryLanguage) for automation, scripting, and querying in Microsoft Sentinel and Defender. Experience with security and monitoring tools such as Zscaler, Microsoft More ❯
retail clients. Key Responsibilities Advanced threat detection and monitoring using industry-leading tools. Building and tuning detections using KustoQueryLanguage (KQL). Responding to and managing security incidents effectively. Engineering robust detections and performing proactive threat hunts. Supporting security automation and infrastructure-as-code initiatives. Qualifications … re looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like Carbon Black, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and container technologies (e.g., Docker) Threat Hunting, Detection Engineering, Incident More ❯
retail clients. Key Responsibilities Advanced threat detection and monitoring using industry-leading tools. Building and tuning detections using KustoQueryLanguage (KQL). Responding to and managing security incidents effectively. Engineering robust detections and performing proactive threat hunts. Supporting security automation and infrastructure-as-code initiatives. Qualifications … re looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like Carbon Black, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and container technologies (e.g., Docker) Threat Hunting, Detection Engineering, Incident More ❯
retail clients. Key Responsibilities Advanced threat detection and monitoring using industry-leading tools. Building and tuning detections using KustoQueryLanguage (KQL). Responding to and managing security incidents effectively. Engineering robust detections and performing proactive threat hunts. Supporting security automation and infrastructure-as-code initiatives. Qualifications … re looking for someone with relevant experience in the following: Security Monitoring & Detection (e.g., XDR tools like Carbon Black, Microsoft Defender XDR, CrowdStrike) Strong KQL capabilities for log analysis and detection tuning Cloud Security (Microsoft Azure, Google Cloud Platform) Kubernetes and container technologies (e.g., Docker) Threat Hunting, Detection Engineering, Incident More ❯
Derby, England, United Kingdom Hybrid / WFH Options
Cooper Parry
NIST, CIS Benchmarks, NCSC guidelines, ISO 27001 and Cyber Essentials Plus (CE+) Practical experience with PowerShell, Python, and KustoQueryLanguage (KQL) for automation, analysis, and custom alerting Exposure to programming languages such as JavaScript, C, or .NET is a big plus! About Us... We’ve been More ❯