×
Register Here to Apply for Jobs or Post Jobs. X

Security Automation Engineer

Job in Raritan, Somerset County, New Jersey, 08869, USA
Listing for: Stefanini, Inc
Full Time position
Listed on 2026-02-23
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer
Salary/Wage Range or Industry Benchmark: 70 - 75 USD Hourly USD 70.00 75.00 HOUR
Job Description & How to Apply Below

Join us to co-create solutions for a better future! Job Details

Cyber Security Engineer / Security Automation Engineer, Raritan, NJ.

Posted: 1/30/2026. Job .

Job Category:
Cyber Security Engineer.

Position Type:
Full Time.

Duration: 6 Months+.

Shift: 1.

Remaining Positions: 1.

Details:
Stefanini Group is looking for a Security Automation Engineer for a globally recognized company. For interested applicants, click the apply button or you may reach out Micah Andres at 386-7399/ for faster processing. Thank you!

Role Summary

A Security Automation Engineer to build and operationalize the automation that correlates Crowd Strike Falcon Device Control telemetry with Active Directory/Azure Entra  changes in Microsoft Sentinel, and then programmatically updates Crowd Strike device control policy group membership via API. The engineer will own the scripting, testing, and configuration working - with our client - required to implement the end‑to‑end flow defined in our design.

Key Responsibilities Build the event pipeline & data model
  • Stand up and harden the FDR to S3 delivery for Falcon Device Control events (e.g., Dc Removable Storage Device Connected , Dc Usb Device Policy Violation , Dc Usb Device Whitelisted , etc.), ensuring schema normalization and lifecycle management in S3.
  • Configure Microsoft Sentinel ingestion for FDR data and AD/Entra /group events; develop KQL parsers, tables, and data normalizations to support correlation.
Correlation & detection logic
  • Author KQL analytics/rules that join Windows Event IDs 4728/4729/6416/4663 with Crowd Strike Device Control events to identify when a user's group status should change host USB policy posture.
  • Implement suppression/thresholding to reduce flapping and false positives (e.g., batch group changes, burst‑aware dedupe).
Automation & integration
  • Build idempotent automation (Power Shell, Python, Logic Apps, Functions, or similar) that calls Crowd Strike APIs to move hosts into/out of the Device Control allow group based on Sentinel signals. Include robust error handling, retries, and audit logging.
  • Package automation as CI/CD artifacts (IaC where appropriate), with secure secrets handling (Key Vault/Secrets Manager).
Testing & validation
  • Develop unit tests for parsers and functions, integration tests for end‑to‑end flows (synthetic Windows events + synthetic FDR samples), and UAT runbooks for security operations.
  • Create simulation data (sanitized/synthetic) to validate rules for Event IDs 4728, 4729, 6416, 4663 and representative FDR Device Control events prior to production cutover.
Operations & documentation
  • Build dashboards in Sentinel that show pipeline health, rule efficacy, and host policy transitions.
  • Document the full runbook: deployment, rollback, break‑glass steps, and change control.
  • Train L2/L3 SOC and Help Desk on troubleshooting and manual override procedures.
Job Requirements Details

Minimum Qualifications
  • 5+ years in security engineering/automation with SIEM (Microsoft Sentinel) and endpoint security integrations.
  • Proficiency in KQL, Python and/or Power Shell, and REST/OAuth2 API integration.
  • Hands‑on experience with Crowd Strike Falcon (preferably Device Control), FDR pipelines, and API‑driven policy management.
  • Solid understanding of Windows Security Event Log semantics—especially 4728/4729 (group membership changes), 6416 (new device recognized), 4663 (file access)—and how to correlate with endpoint telemetry.
  • Cloud data engineering basics: AWS S3 object, schema evolution, and secured ingestion;
    Azure identity fundamentals.
Preferred Qualifications
  • Experience building SOAR playbooks (e.g., Sentinel Automation Rules/Logic Apps) and CI/CD pipelines for security automations.
  • Prior implementation of device control/DLP workflows and handling USB policy exceptions at scale.
  • Exposure to regulated environments (e.g., healthcare/life sciences) and change‑controlled releases.
  • Familiarity with Entra  (formerly Azure AD) group modeling and hybrid AD sync nuances.

Pay Range: $70.00 - $75.00

Already have an account? Log in here#J-18808-Ljbffr
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary