Security Engineer - SIEM, KQL
Harvey Nash
Charing Cross, United Kingdom
2 days ago
Role details
Contract type
Permanent contract Employment type
Full-time (> 32 hours) Working hours
Regular working hours Languages
English Experience level
Intermediate Compensation
£ 104KJob location
Charing Cross, United Kingdom
Tech stack
Microsoft Windows
Microsoft Active Directory
Amazon Web Services (AWS)
Azure
Cloud Computing
CompTIA Security+
Computer Security
Data Retention
Linux
Intrusion Detection and Prevention
Python
Powershell
Kusto Query Language
Security Information and Event Management
YAML
Data Processing
Scripting (Bash/Python/Go/Ruby)
Google Cloud Platform
Mitre Att&ck
Firewalls (Computer Science)
Cybercrime
Microsoft Sentinel
Purple Team (Cyber Security)
Network Server
Job description
SIEM Management & Optimization:
- Design, implement, and maintain Microsoft Sentinel workspaces, connectors, analytics rules, and playbooks
- Develop advanced KQL queries for threat hunting and reporting
- Optimize SIEM performance, cost, and data retention policies
- Troubleshoot log ingestion and parsing issues
Log Source Integration:
- Onboard and configure critical log sources (AD, Firewalls, Servers, cloud infrastructure)
- Manage event collection and forwarding infrastructure
- Implement data filtering and custom log parsing
Threat Detection & Use Case Development:
- Develop and refine detection rules based on threat intelligence and attack patterns
- Continuously improve detection efficacy and reduce false positives
Security Monitoring & Incident Response:
- Monitor systems for anomalies and malicious activity
- Contribute to threat hunting and incident response playbooks
- Provide expert guidance on securing applications and infrastructure
Security Advisory & Innovation:
- Support PoCs for new security tools
- Help define and measure control effectiveness
Requirements
- Certifications: AZ-500, SC-200, SC-900, CompTIA Security+, CISSP, GCIA, GCIH, GCFA, CCSP
- Experience with SOAR playbooks, YARA rules, STIX, and YAML
- Participation in red/purple team exercises.
Please apply within for further details - Alex Reeder Harvey Nash
- 3+ years in a Security Engineer, SOC Analyst, or similar role
- Hands-on experience with Microsoft Sentinel and KQL
- Strong knowledge of Active Directory, Windows/Linux systems, and cloud platforms (Azure, AWS, GCP)
- Proficiency in Scripting (PowerShell, Python)
- Familiarity with security frameworks (MITRE ATT&CK, NIST, Kill Chain)
- Experience with EDR, DLP, Proxy, and SEG tools, * Certifications: AZ-500, SC-200, SC-900, CompTIA Security+, CISSP, GCIA, GCIH, GCFA, CCSP
- Experience with SOAR playbooks, YARA rules, STIX, and YAML
- Participation in red/purple team exercises.