Job Description & How to Apply Below
Key Responsibilities:
6-8 years of experience in administering and optimizing Microsoft Sentinel (connectors, analytic rules, workbooks, playbooks).
Integrate and normalize log data from Defender, firewalls, M365, and third-party tools.
Build KQL queries, correlation rules, and SOAR automation (Logic Apps).
Optimize data ingestion and storage for performance and cost efficiency.
Collaborate with SOC teams to enhance detection coverage and reduce alert fatigue.
Maintain and fine-tune Microsoft Defender XDR integrations with Sentinel.
Preferred Skills &
Certifications:
Strong KQL and Power Shell skills; familiarity with Azure Monitor, AMA, and security APIs.
Certifications:
SC-200, AZ-500, or SC-100 preferred.
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
Search for further Jobs Here:
×