At a Glance
- Tasks: Enhance Microsoft security by remediating vulnerabilities and improving compliance controls.
- Company: Join a forward-thinking tech company focused on cloud security.
- Benefits: Hybrid working, hands-on experience, and measurable impact on cyber posture.
- Why this job: Take ownership of real-world security challenges and make a difference in cyber safety.
- Qualifications: Experience with Defender for Cloud and strong problem-solving skills required.
- Other info: 3-month contract with opportunities for growth in a modern security environment.
The predicted salary is between 36000 - 60000 £ per year.
We are hiring an Azure Security Engineer to strengthen our Microsoft security posture with a hands-on focus on improving Defender for Cloud findings, remediating vulnerabilities across Azure and endpoint estates, and uplift of compliance and data protection controls. This is a role for someone who enjoys fixing things, not just recommending. You’ll be embedded with engineering and infrastructure teams, working through remediation tasks, tightening configuration, and improving real-world risk reduction week by week.
Core Responsibilities
- Microsoft Defender Suite (Primary Requirement)
- Monitor and remediate vulnerabilities surfaced by Defender for Cloud
- Manage and optimise Defender for Endpoint, attack surface reduction and device hardening
- Operate and tune External Attack Surface Management (EASM) findings and asset exposure
- Improve Secure Score and continuously reduce risk through technical remediation
- Collaborate with SOC to triage, respond, and close findings
- Data Protection & Compliance (Purview-Led)
- Implement and manage Purview (DLP, sensitivity labels, insider risk, records)
- Assist with compliance uplift against ISO 27001, SOC2, GDPR, NIS2
- Maintain audit trails, evidence, runbooks, and security documentation
- Vulnerability & Configuration Hardening
- Hands-on remediation — patching, configuration fixes, policy deployments
- Work with product teams to close findings rather than just escalate
- Improve posture for identity, endpoints, networking, and cloud workloads
- Implement conditional access, PIM, key vault, and encryption standards
- Detection, Monitoring & Response
- Tune Sentinel analytics, automation rules, alert noise reduction
- Support incident investigation, triage, threat hunting as needed
- Generate security metrics, reporting, and measurable improvement trends
- Collaboration & Delivery
- Work with DevOps, Infra, Desktop, and Cloud teams on real-world fixes
- Translate risk into understandable action for stakeholders
- Create repeatable processes to shorten future remediation cycles
Experience & Skills Needed
Must-Have
- Strong hands-on experience with Defender for Cloud, Defender for Endpoint, EASM
- Working knowledge of Purview, DLP, sensitivity labels, insider risk
- Demonstrable history of closing vulnerabilities and improving posture
- Azure identity & access security (Entra ID, Conditional Access, PIM)
- PowerShell/MS Graph for automation or scripted remediation
Nice to Have
- Sentinel exposure (analytic rules, workbooks, automation)
- Understanding of Zero Trust principles and Microsoft Compliance Manager
- Experience working in regulated or audited environments
Certifications Required
- AZ-500 – Azure Security Engineer Associate
- SC-100 (or commitment to completion within 12 months)
- Plus one of → MS-500 or SC-400 or SC-900
Desirable
- CCSP
- Additional Defender/M365 security modules
What This Role Offers
- Real ownership in improving cyber posture
- Hands-on security engineering where the work is measurable
- Hybrid UK working
- Modern cloud-security-driven environment
- 3 month initial contract outside IR35
Azure Security Engineer Contract employer: With Intelligence
Contact Detail:
With Intelligence Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Azure Security Engineer Contract
✨Tip Number 1
Get your hands dirty! When you’re in the interview, talk about specific vulnerabilities you've tackled and how you’ve improved security postures. Show them you’re not just a talker but a doer who loves fixing things.
✨Tip Number 2
Network like a pro! Connect with people in the industry on LinkedIn or at local meetups. Share your experiences with Defender for Cloud and Purview, and don’t be shy to ask for advice or referrals. We all know it’s not just what you know, but who you know!
✨Tip Number 3
Prepare for hands-on assessments! Many companies want to see your skills in action. Brush up on your PowerShell and MS Graph scripting abilities, and be ready to demonstrate how you’d remediate vulnerabilities on the spot.
✨Tip Number 4
Apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are proactive and take the initiative to connect directly with us.
We think you need these skills to ace Azure Security Engineer Contract
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your hands-on experience with Microsoft Defender Suite and vulnerability remediation. We want to see how you've tackled similar challenges in the past, so don’t hold back on those details!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you’re passionate about improving security postures and how your skills align with our needs. Keep it engaging and relevant to the role.
Showcase Your Technical Skills: Be specific about your technical skills, especially around Azure identity & access security and PowerShell automation. We love seeing concrete examples of how you've used these tools to make a difference.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for this exciting opportunity. Don’t miss out!
How to prepare for a job interview at With Intelligence
✨Know Your Tools Inside Out
Make sure you’re well-versed in the Microsoft Defender Suite, especially Defender for Cloud and Defender for Endpoint. Be ready to discuss specific vulnerabilities you've remediated and how you’ve optimised these tools in past roles.
✨Showcase Your Hands-On Experience
This role is all about fixing things, so come prepared with examples of your hands-on remediation work. Talk about specific instances where you’ve patched vulnerabilities or tightened configurations, and how that improved security posture.
✨Understand Compliance Requirements
Familiarise yourself with compliance frameworks like ISO 27001 and GDPR. Be ready to explain how you’ve assisted in compliance uplift in previous positions, particularly with tools like Purview and DLP.
✨Collaboration is Key
Highlight your experience working with cross-functional teams such as DevOps and Infrastructure. Share examples of how you’ve translated complex security risks into actionable tasks for stakeholders, showcasing your ability to communicate effectively.