MS Sentinel

Diverse Lynx

  • Rajasthan
  • Permanent
  • Full-time
  • 1 month ago
Exp: 5+ YearsSkill- need Sentinel implementation experience & KQLJD : --A role involving Microsoft Sentinel typically centers around designing, implementing, and managing security monitoring solutions using this cloud-native SIEM (Security Information and Event Management) platform.Common Responsibilities
  • Deploy and configure Microsoft Sentinel to monitor security events across cloud and on-premises environments.
  • Develop custom analytics rules and workbooks to detect threats and visualize data.
  • Create and maintain automation playbooks using Logic Apps for incident response.
  • Integrate data connectors to ingest logs from various sources (Azure, Microsoft 365, firewalls, etc.).
  • Investigate and respond to security incidents, working closely with SOC teams.
  • Continuously improve detection capabilities by staying updated on emerging threats.
Desired Skills
  • Strong knowledge of Microsoft Sentinel and other Microsoft security tools (Defender, Azure Security Center).
  • Experience with Kusto Query Language (KQL) for writing detection rules.
  • Familiarity with PowerShell or Python for automation.
  • Understanding of cybersecurity frameworks and best practices.
  • Experience with SIEM/SOAR platforms and incident response processes.
  • Microsoft Sentinel Implementation: Design, configure, and deploy Microsoft Sentinel solutions to monitor security events and incidents across the organisation and clients' networks.
  • Security Incident Detection: Develop and maintain custom security rules and queries to detect and analyse potential security threats and vulnerabilities.
  • Incident Response: Understand incident response efforts including investigating, containing, and mitigating security incidents in a timely and effective manner.
  • Custom Sentinel Development: Building of custom data connectors to ingest logs from customer environments, and the ability to work with a customer to understand and guide log capture and alerting requirements so as to also build effective analytic rules used by the SOC team.
  • Security Threat Analysis: Analyse and document security events and incidents to understand their nature, impact, and root causes, and provide recommendations for improvement.
  • Automation and Orchestration: Create and maintain automation scripts for incident response and remediation processes to improve operational efficiency.
  • Collaboration: Work closely with cross-functional teams, including security analysts, network engineers, and system administrators, to enhance security posture and ensure a cohesive security strategy.
  • Continuous Improvement: Stay current with industry trends and emerging threats, recommend security enhancements, and participate in security training and knowledge sharing within the team.
  • Documentation: Maintain comprehensive documentation of security procedures, incident reports, and best practices.

Diverse Lynx