Description
We are seeking a skilled SOC L3 Analyst with Microsoft Sentinel
Administration experience to join our cybersecurity team, focusing on
delivering security services in a Managed Security Service Provider
(MSSP) environment. This role will involve managing and configuring
Microsoft Sentinel to monitor and respond to security incidents across
multiple clients. The ideal candidate will have strong expertise in threat
detection, incident response, and SIEM administration, with experience in
multi-tenant environments.
- Minimum 7 years of experience in SOC environment
- Strong experience with Microsoft Sentinel administration, including
data integration, log management, and incident handling across
multiple clients. - Kusto Query Language (KQL) proficiency for crafting advanced
queries, optimizing detections, and conducting detailed log analyses. - Proven skills in incident response and threat hunting in complex,
multi-client setups. - Familiarity with SOAR capabilities within Sentinel and automating
incident response workflows using Logic Apps. - Solid understanding of network, endpoint, and cloud security
principles applicable to varied client environments.
Requirements
- Minimum Bachelor’s Degree in Computer Science/Information
Security, or a related field - Certifications: Microsoft Certified Security Operations Analyst
Associate, - CompTIA CySA+, GIAC GCIA, GCFA, CEH or similar
certifications relevant to SOC and MSSP operations is preferred