Security Engineer - SIEM, KQL

Harvey Nash
Charing Cross, United Kingdom
2 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Intermediate
Compensation
£ 104K

Job location

Charing Cross, United Kingdom

Tech stack

Microsoft Windows
Microsoft Active Directory
Amazon Web Services (AWS)
Azure
Cloud Computing
CompTIA Security+
Computer Security
Data Retention
Linux
Intrusion Detection and Prevention
Python
Powershell
Kusto Query Language
Security Information and Event Management
YAML
Data Processing
Scripting (Bash/Python/Go/Ruby)
Google Cloud Platform
Mitre Att&ck
Firewalls (Computer Science)
Cybercrime
Microsoft Sentinel
Purple Team (Cyber Security)
Network Server

Job description

SIEM Management & Optimization:

  • Design, implement, and maintain Microsoft Sentinel workspaces, connectors, analytics rules, and playbooks
  • Develop advanced KQL queries for threat hunting and reporting
  • Optimize SIEM performance, cost, and data retention policies
  • Troubleshoot log ingestion and parsing issues

Log Source Integration:

  • Onboard and configure critical log sources (AD, Firewalls, Servers, cloud infrastructure)
  • Manage event collection and forwarding infrastructure
  • Implement data filtering and custom log parsing

Threat Detection & Use Case Development:

  • Develop and refine detection rules based on threat intelligence and attack patterns
  • Continuously improve detection efficacy and reduce false positives

Security Monitoring & Incident Response:

  • Monitor systems for anomalies and malicious activity
  • Contribute to threat hunting and incident response playbooks
  • Provide expert guidance on securing applications and infrastructure

Security Advisory & Innovation:

  • Support PoCs for new security tools
  • Help define and measure control effectiveness

Requirements

  • Certifications: AZ-500, SC-200, SC-900, CompTIA Security+, CISSP, GCIA, GCIH, GCFA, CCSP
  • Experience with SOAR playbooks, YARA rules, STIX, and YAML
  • Participation in red/purple team exercises.

Please apply within for further details - Alex Reeder Harvey Nash

  • 3+ years in a Security Engineer, SOC Analyst, or similar role
  • Hands-on experience with Microsoft Sentinel and KQL
  • Strong knowledge of Active Directory, Windows/Linux systems, and cloud platforms (Azure, AWS, GCP)
  • Proficiency in Scripting (PowerShell, Python)
  • Familiarity with security frameworks (MITRE ATT&CK, NIST, Kill Chain)
  • Experience with EDR, DLP, Proxy, and SEG tools, * Certifications: AZ-500, SC-200, SC-900, CompTIA Security+, CISSP, GCIA, GCIH, GCFA, CCSP
  • Experience with SOAR playbooks, YARA rules, STIX, and YAML
  • Participation in red/purple team exercises.

Apply for this position