Description
Role: IT SOC Analyst – Azure Sentinel Specialist
Location: Reading (1–2 days onsite/week)
Type: Contract | Rate: £500/day | Duration: Long-term
I have limited Access to my freelancermap please share your Cv to for immediate attention.
We’re hiring an experienced IT SOC Analyst with strong Azure Sentinel administration skills, KQL scripting, and a solid background in OT/ICS environments. This is a hands-on technical role focusing on managing, configuring, and optimizing Sentinel-based SOC operations, supporting both IT and OT cyber security.
? Key Responsibilities
• Administer and optimize Microsoft Sentinel SIEM; write & fine-tune KQL queries/alerts
• Investigate and respond to security incidents across IT and OT environments
• Lead and mentor SOC team; act as escalation point and interface with key stakeholders
• Proactively hunt threats and improve SecOps processes and tooling (SOAR, EDR, PAM)
• Support incident response and readiness, including on-call coverage with MSSP
• Enhance detection, response, and compliance with GDPR, NIS, ISO 27001
? Must-Have Experience
• 3+ years in Cyber Security and OT (ICS, SCADA, CNI) environments
• Proven hands-on Sentinel configuration & administration
• Strong KQL scripting skills
• Familiarity with SOC tools and technologies (e.g., EDR, PAM, MFA, XDR)
• Ability to communicate complex security topics clearly to non-technical stakeholders
? Bonus Points For
• Microsoft SC-200, AZ-900 or other security certifications
• Experience with NAC, firewalls, IDS/IPS
• Claroty or OT-specific cybersecurity certifications
Location: Reading (1–2 days onsite/week)
Type: Contract | Rate: £500/day | Duration: Long-term
I have limited Access to my freelancermap please share your Cv to for immediate attention.
We’re hiring an experienced IT SOC Analyst with strong Azure Sentinel administration skills, KQL scripting, and a solid background in OT/ICS environments. This is a hands-on technical role focusing on managing, configuring, and optimizing Sentinel-based SOC operations, supporting both IT and OT cyber security.
? Key Responsibilities
• Administer and optimize Microsoft Sentinel SIEM; write & fine-tune KQL queries/alerts
• Investigate and respond to security incidents across IT and OT environments
• Lead and mentor SOC team; act as escalation point and interface with key stakeholders
• Proactively hunt threats and improve SecOps processes and tooling (SOAR, EDR, PAM)
• Support incident response and readiness, including on-call coverage with MSSP
• Enhance detection, response, and compliance with GDPR, NIS, ISO 27001
? Must-Have Experience
• 3+ years in Cyber Security and OT (ICS, SCADA, CNI) environments
• Proven hands-on Sentinel configuration & administration
• Strong KQL scripting skills
• Familiarity with SOC tools and technologies (e.g., EDR, PAM, MFA, XDR)
• Ability to communicate complex security topics clearly to non-technical stakeholders
? Bonus Points For
• Microsoft SC-200, AZ-900 or other security certifications
• Experience with NAC, firewalls, IDS/IPS
• Claroty or OT-specific cybersecurity certifications