Job Search and Career Advice Platform

Enable job alerts via email!

Senior Security Engineer - SIEM, KQL

Harvey Nash Group

Greater London

Hybrid

GBP 60,000 - 80,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading investment bank in London is seeking a skilled Security Engineer specializing in SIEM and KQL. The role involves designing and maintaining Microsoft Sentinel, developing threat hunting queries, and responding to security incidents. Candidates should have over 3 years of relevant experience and strong knowledge of cloud platforms and security frameworks. This position offers a hybrid work model with a focus on security optimization and incident response.

Qualifications

  • 3+ years in a Security Engineer, SOC Analyst, or similar role.
  • Hands-on experience with Microsoft Sentinel and KQL.
  • Strong knowledge of Active Directory, Windows / Linux systems, and cloud platforms.

Responsibilities

  • Design, implement, and maintain Microsoft Sentinel workspaces.
  • Develop advanced KQL queries for threat hunting and reporting.
  • Monitor systems for anomalies and malicious activity.
  • Contribute to threat hunting and incident response playbooks.

Skills

Microsoft Sentinel
KQL
Threat hunting
Incident response
PowerShell
Python
Active Directory
Cloud platforms (Azure, AWS, GCP)
Job description
Security Engineer - SIEM, KQL- sought by investment bank based in London.

Inside IR35 - 3 days a week on-site

Key Responsibilities
  • SIEM Management & Optimization:
  • Design, implement, and maintain Microsoft Sentinel workspaces, connectors, analytics rules, and playbooks
  • Develop advanced KQL queries for threat hunting and reporting
  • Optimize SIEM performance, cost, and data retention policies
  • Troubleshoot log ingestion and parsing issues
  • Log Source Integration:
  • Onboard and configure critical log sources (AD, firewalls, servers, cloud infrastructure)
  • Manage event collection and forwarding infrastructure
  • Implement data filtering and custom log parsing
  • Threat Detection & Use Case Development:
  • Develop and refine detection rules based on threat intelligence and attack patterns
  • Continuously improve detection efficacy and reduce false positives
  • Security Monitoring & Incident Response:
  • Monitor systems for anomalies and malicious activity
  • Contribute to threat hunting and incident response playbooks
  • Provide expert guidance on securing applications and infrastructure
  • Security Advisory & Innovation:
  • Support PoCs for new security tools
  • Help define and measure control effectiveness
Required Skills & Experience
  • Certifications: AZ-500, SC-200, SC-900, CompTIA Security+, CISSP, GCIA, GCIH, GCFA, CCSP
  • Experience with SOAR playbooks, YARA rules, STIX, and YAML
  • Participation in red/purple team exercises.
  • 3+ years in a Security Engineer, SOC Analyst, or similar role
  • Hands‑on experience with Microsoft Sentinel and KQL
  • Strong knowledge of Active Directory, Windows / Linux systems, and cloud platforms (Azure, AWS, GCP)
  • Proficiency in scripting (PowerShell, Python)
  • Familiarity with security frameworks (MITRE ATT&CK, NIST, Kill Chain)
  • Experience with EDR, DLP, Proxy, and SEG tools
Desirable Qualifications
  • Certifications: AZ-500, SC-200, SC-900, CompTIA Security+, CISSP, GCIA, GCIH, GCFA, CCSP
  • Experience with SOAR playbooks, YARA rules, STIX, and YAML
  • Participation in red/purple team exercises.

Please apply within for further details – Alex Reeder, Harvey Nash

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.