Job Overview:
Seeking a Cyber Security Analyst with expertise in Azure Sentinel to monitor detect investigate and respond to cyber threats in a cloud environment. The role involves log analysis threat intelligence security automation and incident response primarily within a Security Operations Center (SOC).
Key Responsibilities:
- Log Management: Collect and analyze security logs from Azure services and onprem systems.
- Threat Detection & Alerting: Develop detection rules using Kusto Query Language (KQL).
- Incident Response: Investigate alerts perform deep analysis and coordinate remediation.
- Threat Hunting: Proactively search for threats using advanced security queries.
- Security Automation: Build automated workflows/playbooks for incident response.
- Configuration & Optimization: Finetune Azure Sentinel settings and integrate with security tools.
- Reporting: Generate reports on security incidents and threat trends.
Required Skills & Experience:
- Azure Sentinel expertise and SIEM (Security Information and Event Management) experience.
- Proficiency in KQL (Kusto Query Language) for log analysis and threat hunting.
- Strong cybersecurity threat intelligence and automation knowledge.
- Familiarity with Python for security automation.
- Understanding of network security & communication protocols (ICMP TCP/IP HTTP SNMP etc..
- Security certifications (CEH Security SSCP) are a plus.