Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Security Engineer – SIEM / Sentinel Specialist
We have partnered with an exciting, growing and high performance Buy-Side Firm based in Central London (Liverpool Street area) who are on the search for a Security Engineer to reinforce their Cyber Security team that holds a key focus on monitoring, detection engineering, automation and incident response.
This role sits at the heart of SIEM engineering, threat detection, and security operations, helping improve monitoring capabilities and strengthening their defense! It's a fantastic opportunity to work alongside one of the best Security teams in the business, manage multiple tools and make a real impact where Security is at the forefront of their operations!
Key Responsibilities
- Design, build, and maintain SIEM environments and to develop tools for threat hunting and investigations.
- Optimise the performance, strategies and cost performance of the SIEM.
- Onboard and tune security log sources across infrastructure and cloud environments
- Configure and manage event collection and forwarding pipelines
- Build automation workflows and Integrate SIEM with security tools.
- Design, development, and implementation of security automation workflows using Azure Logic Apps and Azure Sentinel Playbooks
- Develop and refine threat detection use cases, attack pattern rules and translate threat intelligence into actionable logic.
- To work with the incident response, threat hunting, and to develop their playbook.
Ideal Background
- 2-5 years in security engineering or SOC positions.
- Consistent use of Azure Sentinel, Logic Apps, Python, KQL and Microsoft Defender.
- Scripting experience with Python or Powershell
- Active Directory, Networking and Cloud Security knowledge are key.
Key Skills
Ranked by relevanceReady to apply?
Join Hunter Bond and take your career to the next level!
Application takes less than 5 minutes

