Description:
Responsibilities:
Design and deploy Microsoft Sentinel architectures tailored to customer needs;
Integrate various data sources (cloud, on-premises, third-party) for unified visibility;
Configure analysis rules, connectors, detection models, and watch lists;
Optimize performance and reduce false positives by adjusting rules;
Automate incident responses with Playbooks (Azure Logic Apps);
Develop scripts (PowerShell, KQL, Python) to automate and validate security;
Collaborate with internal and customer teams, lead workshops, and write reports;
Act as SME of the Sentinel project.
Required:
Degree in computer science, cybersecurity, or a related field (or equivalent experience). Equivalent mix of Cyber certification will be considered.
5 to 8 years of experience in cybersecurity, including 3+ years in cloud/Microsoft Azure security;
Experience in SIEM/SOAR implementation, SOC operations, incident response;
Experience in professional services: customer relations, workshops, documentation, presentations;
Advanced expertise in Microsoft Sentinel (SIEM/SOAR, KQL, UEBA, playbooks, threat hunting);
Proficiency in Microsoft Azure security: Defender, Azure AD/Entra ID, IAM, NSG, Azure Policy;
Strong skills in KQL, PowerShell, and Python for automation and analysis;
Good understanding of cloud architectures (IaaS, PaaS, SaaS) and hybrid/multi-cloud environments;
Knowledge of networking (TCP/IP, VPN, firewalls, IDS/IPS, EDR) and cybersecurity standards (ISO 27001, NIST, GDPR);
Good to have:
Microsoft AZ-500, SC-200, SC-100 certifications (an asset);
Cybersecurity certifications: CISSP, CCSP, SANS GSEC ranges (an asset);
Any Graduate