Security Development Engineer - Up to £650/day (Inside IR35)- Investment Banking

Security Development Engineer - Up to £650/day (Inside IR35)- Investment Banking

Posted 3 days ago by Hunter Bond

£650 Per day
Inside
Hybrid
London Area, United Kingdom

Summary: The Security Content Development Engineer role at a leading investment bank involves creating detection logic and dashboards to enhance security monitoring. The position requires integrating log feeds and automating response processes while leveraging threat intelligence for improved incident handling. This hybrid role is focused on enhancing the bank's security technology stack. The contract is for a duration of 6 months with a competitive daily rate.

Key Responsibilities:

  • Create tailored detection logic and dashboards to enhance visibility and response across Sentinel and other platforms.
  • Integrate essential log feeds and build automated response processes using Azure-native tools and scripting languages.
  • Leverage threat intel to build detection content, support hunting activities, and improve incident handling procedures.

Key Skills:

  • Minimum of 3 years of practical experience in SOC, SIEM, or Security Automation roles.
  • Demonstrated proficiency in KQL, YARA, STIX, and working with SIEM platforms, ideally Microsoft Sentinel.
  • Strong scripting skills in PowerShell and Python for automation and data parsing tasks.
  • In-depth knowledge of log ingestion processes, Active Directory, and cloud infrastructure monitoring.

Salary (Rate): £650 daily

City: London

Country: United Kingdom

Working Arrangements: hybrid

IR35 Status: inside IR35

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

Job title: Security Content Development Engineer

Client: Investment Bank

Rate: Up to £650p/d (Inside IR35)

Duration: 6 month rolling

Location: London / Hybrid

My client is a top ranked, globally renowned firm that invests large amount of money into maturing their technology stacks - especially within the security space!

Responsibilities

  • Security Monitoring Development: Create tailored detection logic and dashboards to enhance visibility and response across Sentinel and other platforms.
  • Data Source Enablement & Workflow Automation: Integrate essential log feeds and build automated response processes using Azure-native tools and scripting languages.
  • Threat Analysis & Operational Support: Leverage threat intel to build detection content, support hunting activities, and improve incident handling procedures.

Core skills required:

  • Minimum of 3 years of practical experience in SOC, SIEM, or Security Automation roles.
  • Demonstrated proficiency in KQL, YARA, STIX, and working with SIEM platforms, ideally Microsoft Sentinel.
  • Strong scripting skills in PowerShell and Python for automation and data parsing tasks.
  • In-depth knowledge of log ingestion processes, Active Directory, and cloud infrastructure monitoring.

If you are interested in the Security role, please apply directly or email hrubin@hunterbond.com