
SIEM Analyst
⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for a SIEM Analyst with active SC Clearance, offering up to £589/day for a 6-month hybrid contract in London. Key skills include expertise in Microsoft Sentinel, KQL, cyber incident response, and knowledge of security architecture principles.
🌎 - Country
United Kingdom
💱 - Currency
£ GBP
-
💰 - Day rate
-
🗓️ - Date discovered
July 23, 2025
🕒 - Project duration
More than 6 months
-
🏝️ - Location type
Hybrid
-
📄 - Contract type
Inside IR35
-
🔒 - Security clearance
Yes
-
📍 - Location detailed
London
-
🧠 - Skills detailed
#Microsoft Azure #Datasets #Cybersecurity #Azure #Deployment #Alation #Security #Documentation #KQL (Kusto Query Language) #Scala #Data Analysis
Role description
Heading 1
Heading 2
Heading 3
Heading 4
Heading 5
Heading 6
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.
Block quote
Ordered list
- Item 1
- Item 2
- Item 3
Unordered list
- Item A
- Item B
- Item C
Bold text
Emphasis
Superscript
Subscript
SIEM Analyst
Active SC Clearance Required
London - Hybrid (1 day/week onsite)
Up to £589/day DOE (Inside IR35)
6 Month Contract
Role details:
We're partnering with a global consultancy who are leading a Windows Hello Deployment for a key client in the Energy sector. They're looking for a SIEM Analyst with experience in Sentinel and KQL experience to support the Security team.
Responsibilities:
• Provide hands-on SIEM support, including policy updates using KQL and Microsoft Sentinel.
• Act as the primary escalation point for cybersecurity incidents from L1 SOC support.
• Perform deep data analysis using security tools to identify and respond to threats.
• Serve as an incident responder during Major Incident Management (MIM) events.
• Maintain and update all SOC documentation, processes, and procedures to reflect current practices.
• Apply expert-level security skills to design, build, and protect enterprise systems, data, applications, and infrastructure
Requirements:
• Expert proficiency in Security Information and Event Management (SIEM), with a strong emphasis on Microsoft Azure Sentinel.
• Proficiency in Kusto Query Language (KQL) for rule creation, threat detection, and investigation within Sentinel.
• Advanced experience in cyber incident response and security breach operations.
• Intermediate knowledge of security architecture design principles.
• Strong understanding of enterprise IT environments and threat landscapes.
• Proven ability to analyse large datasets and identify actionable insights in the context of cybersecurity.
• Familiarity with SOC operations, including process documentation and escalation protocols.
Eligibility:
To be considered for the role, you must have active SC Clearance.
Reasonable Adjustments:
Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built, and we welcome applications from people of all backgrounds and perspectives. Our success is driven by our people, united by the spirit of partnership to deliver the best resourcing solutions for our clients.
If you need any help or adjustments during the recruitment process for any reason, please let us know when you apply or talk to the recruiters directly so we can support you.