Security Development Engineer - Up to £650/day (Inside IR35)- Investment Banking
Posted 3 days ago by Hunter Bond
£650 Per day
Inside
Hybrid
London Area, United Kingdom
Summary: The Security Content Development Engineer role at a leading investment bank involves creating detection logic and dashboards to enhance security monitoring. The position requires integrating log feeds and automating response processes while leveraging threat intelligence for improved incident handling. This hybrid role is focused on enhancing the bank's security technology stack. The contract is for a duration of 6 months with a competitive daily rate.
Key Responsibilities:
- Create tailored detection logic and dashboards to enhance visibility and response across Sentinel and other platforms.
- Integrate essential log feeds and build automated response processes using Azure-native tools and scripting languages.
- Leverage threat intel to build detection content, support hunting activities, and improve incident handling procedures.
Key Skills:
- Minimum of 3 years of practical experience in SOC, SIEM, or Security Automation roles.
- Demonstrated proficiency in KQL, YARA, STIX, and working with SIEM platforms, ideally Microsoft Sentinel.
- Strong scripting skills in PowerShell and Python for automation and data parsing tasks.
- In-depth knowledge of log ingestion processes, Active Directory, and cloud infrastructure monitoring.
Salary (Rate): £650 daily
City: London
Country: United Kingdom
Working Arrangements: hybrid
IR35 Status: inside IR35
Seniority Level: undetermined
Industry: IT
Job title: Security Content Development Engineer
Client: Investment Bank
Rate: Up to £650p/d (Inside IR35)
Duration: 6 month rolling
Location: London / Hybrid
My client is a top ranked, globally renowned firm that invests large amount of money into maturing their technology stacks - especially within the security space!
Responsibilities
- Security Monitoring Development: Create tailored detection logic and dashboards to enhance visibility and response across Sentinel and other platforms.
- Data Source Enablement & Workflow Automation: Integrate essential log feeds and build automated response processes using Azure-native tools and scripting languages.
- Threat Analysis & Operational Support: Leverage threat intel to build detection content, support hunting activities, and improve incident handling procedures.
Core skills required:
- Minimum of 3 years of practical experience in SOC, SIEM, or Security Automation roles.
- Demonstrated proficiency in KQL, YARA, STIX, and working with SIEM platforms, ideally Microsoft Sentinel.
- Strong scripting skills in PowerShell and Python for automation and data parsing tasks.
- In-depth knowledge of log ingestion processes, Active Directory, and cloud infrastructure monitoring.
If you are interested in the Security role, please apply directly or email hrubin@hunterbond.com