Apply on
This position will support our client’s Managed Detection and Response (MDR) services, which includes:
· Deployment and ongoing development of Microsoft Sentinel, a leading Security Incident and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) platform.
· Enablement and enhancement of the Microsoft Defender XDR, an integrated suite of technologies to protect endpoints, identities, SaaS apps, cloud workloads, data, and email/collaboration tools, including related connectivity with Microsoft Sentinel for bi-directional information gathering and actions.
· Continuous Threat Exposure Management (CTEM), using the above tools and Client’s proprietary platform to assist clients in continuously reducing attack surfaces and improving security controls to reduce risk (and related active threat volumes).
Responsibilities:
This position will provide triage of security threats and “hunting” in client environments, searching for indicators of compromise, misconfigurations, or security weaknesses that reveal an early-stage attack or could allow attackers a point of entry. In greater detail, the role will:
· Monitor systems and process notifications of security events.
· Triage security events and determine if such events require escalation.
· Document investigation activities and perform escalations using Microsoft Teams.
· Perform threat and exposure hunting, running predefined queries, interpreting results, and populating client reporting documents with results.
o Such hunting exercises are performed on a scheduled periodic basis (every one to two weeks per client).
· Effectively communicate with U.S. based client’s personnel during escalations and shift transitions.
Preferred Skills and Experience:
Skills and experiences that would be beneficial for this role include:
· Previous experience in a Security Operations Center (SOC), SecOps, or cyber threat monitoring environment.
· Knowledge of basic cloud, SaaS, networking and cybersecurity concepts (for example, identity and access management, data storage and transmittal, application operations, etc.)
· Knowledge of Microsoft Sentinel and Microsoft Defender XDR technologies(1)
· Effective internal communication skills.
· Ability to work independently, with limited direct supervision after training.
· Willing to be in a shifting schedule
Note 1: Candidates will be expected to achieve Microsoft SC-200 certification within 60 days of hire, and annually maintain this certification during their tenure with the client. s