skills, expertise and experience should include: Managing/Operating/Troubleshooting experience in Azure using Azure Management Technologies (Azure Monitor, Log Analytics, Monitoring Agents, KustoQueryLanguage, ARM template, Azure Policies, IaC and deployment models Infrastructure as code experience (highly desirable) Windows Server support experience - experience managing more »
Determine factors that contribute to a detection's effectiveness Programming & Data Handling Experience in search querylanguage such as SPL (in Splunk), KQL (In Microsoft Sentinel) Experience with Scripting languages such as PowerShell, Python, Bash Experience writing Regex Experience with source control (Git, Azure Dev Ops) Knowledge of more »
to enhance the organization's security infrastructure. Key Requirements: SOC Analyst background with hands-on experience in developing and integrating APIs. Proficient in JSON, KQL, and PowerShell. Proven experience in building, maintaining, and optimizing Azure Logic Apps and Sentinel playbooks. Familiarity with automating routine SOC tasks to improve security operations. more »
continuity. Develop and refine security processes, playbooks, and standard operating procedures. Prepare detailed reports on security incidents and trends for clients and management. Writing KQL queries for analysis Sentinel logs QUALIFICATIONS, EXPERIENCE, & SKILLS: Educational & Professional Qualifications: Bachelor’s degree in Information Security, Computer Science, Information Technology, or a related field more »
to enhance the organization's security infrastructure. Key Requirements: SOC Analyst background with hands-on experience in developing and integrating APIs. Proficient in JSON, KQL, and PowerShell. Proven experience in building, maintaining, and optimizing Azure Logic Apps and Sentinel playbooks. Familiarity with automating routine SOC tasks to improve security operations. more »
and Programming: Proficiency with automation tools such as Logic Apps, Functions, Azure Automation, and Event Grid. Knowledge of scripting and programming languages like PowerShell, KQL, and YAML for automating AVD-related tasks. Benefits Package: Generous pension contributions up to 15% Annual bonus, subject to organisational performance Share schemes, including free more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
reconnaissance and emerging threats Understanding of vulnerability assessment and remediation procedures. Strong analytical skills, clear logical thinking, and good judgement An understanding understanding of KQL Knowledge of Microsoft Defender Suite Education/Qualifications CompTIA security + or equivalent SC-200 Microsoft Security Operations Analyst Experience Experience in responding to cyber more »
to enhance the organization's security infrastructure. Key Requirements: SOC Analyst background with hands-on experience in developing and integrating APIs. Proficient in JSON, KQL, and PowerShell. Proven experience in building, maintaining, and optimizing Azure Logic Apps and Sentinel playbooks. Familiarity with automating routine SOC tasks to improve security operations. more »
Azure, Defender Good experience automating processes Experience of Threat Hunting/Detect & Respond procedures Documentation development: processes, procedures, runbooks Experience with the likes of KQL and Logic Apps is required Throughout this role you will help with deployment of new technology and updating processes whilst also having a solid understanding more »
Experience onboarding, tuning, reporting and configuring SIEM solutions. In-depth experience with Microsoft Sentinel, including use case and rule development, workbook/playbook creation, KQL, logic apps/SOAR. Understanding of low-level concepts including operating systems and networking. Key responsibilities include, but not limited too: Respond to alerts escalated more »
Vulnerability Management: Expertise in vulnerability management tools (e.g., Rapid7, Microsoft, Tenable, Qualys) is essential. Automation & Scripting: Experience with automation tools and scripting (Python, PowerShell, KQL) is required, though this isnt a coding-heavy position. Regulated Industries: Experience working in highly regulated industries (banks, pharmaceuticals, etc.) is highly desirable. Interview Process more »
Architecture, Design & Implementation experience across some of the below: Microsoft Defender solutions (Endpoint, Cloud, Office, XDR, Identity, Cloud Apps, IoT). Microsoft Sentinel, with KQL skills (Nice to have). Entra ID MEM/Intune Microsoft Purview Previous consulting experience from working at another Consultancy/Solutions Provider/MSSP more »
Linux environments Strong knowledge of analysis tools such as SIEM/XDR/Wireshark along with OSINT Working knowledge of query languages (e.g., KQL, SQL) for security log analysis and threat detection Good communication skills and customer centric focus - ability to communicate clearly and in a timely manner with more »