KBC Technologies Group

Sentinel SIEM Engineer - Security Cleared

⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for a Security Cleared Sentinel SIEM Engineer, contract length unspecified, with a pay rate of "unknown." Key skills include Microsoft Sentinel expertise, scripting in PowerShell and Python, and SOAR knowledge. Experience with security log sources across multiple domains is essential.
🌎 - Country
United Kingdom
💱 - Currency
£ GBP
-
💰 - Day rate
Unknown
-
🗓️ - Date
November 11, 2025
🕒 - Duration
Unknown
-
🏝️ - Location
Unknown
-
📄 - Contract
Unknown
-
🔒 - Security
Yes
-
📍 - Location detailed
Reading, England, United Kingdom
-
🧠 - Skills detailed
#Scripting #Security #Data Analysis #Deployment #Splunk #KQL (Kusto Query Language) #Scala #Data Ingestion #Cloud #Monitoring #Normalization #Python #Automation
Role description
Candidate MUST be Security Cleared Role Overview As a Sentinel SIEM Engineer, you will be responsible for maintaining, developing, and optimizing the Microsoft Sentinel Security Information and Event Management (SIEM) platform. You will play a key role in enhancing detection capabilities, automating response actions, and integrating security monitoring across IT and OT environments. Acting as a technical subject matter expert, you will collaborate closely with the wider Threat Detection & Response team to ensure the SIEM platform delivers actionable intelligence and supports rapid incident response. Key Responsibilities • Maintain and optimize the Microsoft Sentinel SIEM platform for performance, scalability, and seamless integration with other security tools. • Onboard and configure log sources across cloud, network, identity, and endpoint environments, ensuring accurate data ingestion and normalization. • Design, implement, and maintain custom detection and correlation rulesets to enhance visibility and reduce false positives. • Develop automation and playbooks using SOAR capabilities to streamline triage and remediation workflows. • Collaborate with infrastructure and architecture teams to design and implement end-to-end security monitoring solutions. • Scope, plan, and track new log integrations and analytic rule deployments. • Guide, mentor, and grow the SIEM Engineering function, fostering a culture of continuous improvement and technical excellence. • Work closely with the Threat Detection & Response team to support incident investigations and ensure detection coverage aligns with emerging threats. • Document and enforce SIEM engineering best practices, standard operating procedures, and configuration baselines. Required Skills and Experience • Proven hands-on experience with Microsoft Sentinel (or similar SIEM platforms such as Splunk, QRadar, ArcSight, or LogRhythm). • Deep understanding of security log sources across multiple domains — identity and access, network, system, application, cloud, and OT. • Proficiency in scripting and data analysis languages (PowerShell, KQL, Python). • Strong understanding of Security Orchestration, Automation, and Response (SOAR) concepts and tooling.