

Microsoft Security (Sentinel) Automation & Detection Engineer
β - Featured Role | Apply direct with Data Freelance Hub
This role is for a Microsoft Security (Sentinel) Automation & Detection Engineer on a 6-month contract, hybrid in Cambridge. Key skills include experience with Microsoft Sentinel, KQL, and security automation tools. Requires 5+ years in cybersecurity and relevant certifications.
π - Country
United Kingdom
π± - Currency
Β£ GBP
-
π° - Day rate
760
-
ποΈ - Date discovered
June 18, 2025
π - Project duration
More than 6 months
-
ποΈ - Location type
Hybrid
-
π - Contract type
Inside IR35
-
π - Security clearance
Unknown
-
π - Location detailed
Cambridge, England, United Kingdom
-
π§ - Skills detailed
#Scala #Scripting #Cloud #Automation #Python #Vulnerability Management #Cybersecurity #Migration #Azure Function Apps #Logic Apps #Azure #Firewalls #Azure Logic Apps #KQL (Kusto Query Language) #React #Logging #Data Enrichment #Security
Role description
Heading 1
Heading 2
Heading 3
Heading 4
Heading 5
Heading 6
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.
Block quote
Ordered list
- Item 1
- Item 2
- Item 3
Unordered list
- Item A
- Item B
- Item C
Bold text
Emphasis
Superscript
Subscript
A multinational semiconductor and software design company seeks a Microsoft Security (Sentinel) Automation & Detection Engineer for a 6-month contract to start ASAP, based in Cambridge (Hybrid), Inside IR35
Role Overview:
Utilising knowledge of security operations, incident response, and detection engineering, you will be responsible for the delivery of Microsoft SIEM detections and security automations.
The successful candidate will be proficient in automation and orchestration tools (e.g., SOAR platforms, scripting languages like Python, PowerShell, KQL) and have experience with integrating security tools (e.g., SIEM, EDR, firewalls) APIs, and Case Management tools for data enrichment.
Key Skills and Experience
Experience contributing to large-scale, sprint-based, security automation and detection engineering projects in a SOC/ Cyber Defense or similar environment
Recent hands-on experience with managing and implementing Microsoft Sentinel log sources and detection, with knowledge of the related technical best practices in Sentinel and Azure specifically across
Sentinel Content Hub,
Sentinel Analytics,
Sentinel Automation,
Azure Event Hub,
Azure Logic Apps
Azure Function Apps.
Experience in Sentinel/Analytics Rules/Logic App automations
KQL
Demonstrated ability in cybersecurity, with at least 5 years in a technical role in security operations and/or security software development.
Solid understanding of security operations, automations standard processes, detection engineering and SIEM management.
Experience with cloud security tools and platforms and their integration into SOC operations.
Responsibilities:
Lead technical migration of log sources into Microsoft Sentinel SIEM.
Build security automations, logging, and SIEM detections to improve the Cyber Defence Operationβs efficiency, scalability, and incident response capabilities.
Design, implement, and maintain automated workflows and playbooks to streamline CDO operations, including incident response, threat hunting, cyber threat intelligence and vulnerability management.
Collaborate with Cyber Defence Operation analysts to identify repetitive tasks and automate them to improve operational efficiency.
Collaborate with Threat Intelligence, Incident Response, and Attack Surface Management to build and tune robust SIEM detections for both proactive and reactive response actions.
Continuously evaluate automation solutions for performance, reliability, and scalability, making improvements, as necessary.
Collaborate with third-party vendors and service providers to leverage automation opportunities and ensure successful integrations.
Desirable Skills and Experience:
Vendor-specific certifications for Security orchestration, automation, and response platforms
Ability to develop and implement long-term automation strategies aligned with security operation objectives.
Ability to translate technical concepts into clear, actionable insights for technical and non-technical partners.
Meticulous focus on ensuring accuracy, reliability, and security in automation workflows