drjobs Cloud Security Operations Analyst

Cloud Security Operations Analyst

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Arlington, TX - USA

Monthly Salary drjobs

$ 69200 - 124200

Vacancy

1 Vacancy

Job Description

At Accenture Federal Services nothing matters more than helping the US federal government make the nation stronger and safer and life better for 13000 people are united in a shared purpose to pursue the limitless potential of technology and ingenuity for clients across defense national security public safety civilian and military health organizations.

Join Accenture Federal Services a technology company and part of global Accenture to do work that matters in a collaborative and caring community where you feel like you belong and are empowered to grow learn and thrive through hands-on experience certifications industry training and more.

Join us to drive positive lasting change that moves missions and the government forward!

As a Cloud Security Operations Analyst you will be tasked with the critical role of supporting the day to day management of robust Azure Cloud infrastructure solutions with a particular focus on supporting the infrastructure for a Microsoft Sentinel and Microsoft Defender XDR implementation on behalf of a SOC and CIRT team. Your expertise in Microsoft Sentinel will be pivotal as you navigate through the complexities of managing the requirements from our stakeholders and translating those into actionable infrastructure tasks.

To excel in this role you should bring a wealth of experience in operating a complex SIEM solutions at an enterprise level. Your background should demonstrate a successful track record of working in a cross team matrixed environment to operate and support the infrastructure for comprehensive SIEM solutions. Your ability to communicate effectively and translate technical requirements into actionable strategies will be key to your success.

The work:

  • Leverage native Microsoft Azure technologies including Azure Sentinel Defender XDR Azure Log Analytics Azure Monitor and Azure Policy to support an 800-171 compliant SIEM environment
  • Operations and support of the SIEM solution itself requiring hands-on experience with Sentinel Data Connectors both native and custom
  • Manage maintain and operate an Enterprise Level SIEM solution for AFS IT ensuring its effectiveness and efficiency
  • Work collaboratively with Application Owners the Security Operations Center (SOC) the Computer Incident Response Team (CIRT) and other stakeholders will be vital in developing and maintaining this SIEM solution

Heres what you need:

  • US Citizen
  • 1 year hands on experience managing maintaining and operating Microsoft Sentinel and Microsoft Defender XDR
  • 1 year experience operating a Linux SYSLOG solution
  • 1 year experience with Infra as Code (IaC) (ARM Bicep Terraform preferred)
  • Experience implementing both native Sentinel data connectors as well as custom connectors using Rest API Logs ingestion API CEF Syslog Azure Functions and Custom Logs
  • Experience with Azure DCR (data collection rules) Azure Monitor Azure Monitoring Agent Azure Policy Azure Log Analytics Azure Alerts Kusto Query Language User & Entity Behavior Analytics (UEBA) Analytic Rules and Monitoring Workbooks to support a Microsoft Sentinel implementation
  • Experience utilizing Azure Arc for managing resources in a hybrid Azure Commercial Azure Gov AWS GCP and OnPrem environment
  • Experience being involved in workstreams where you are an active contributor and can talk to the progress and results of assigned tasks
  • Ability to support other Azure Cloud engineering tasks as needed
  • Ability to be on call as needed

Bonus points if you have:

  • Azure Administrator and/or Architecture Certification
  • Azure Security Engineer Associate Certification
  • Experience migrating Splunk to Sentinel
  • Experience with security compliance and NIST 800-171
  • Enjoy learning new technologies quickly and staying up to date on cloud technology

As required by local law Accenture Federal Services provides reasonable ranges of compensation for hired roles based on labor costs in the states ofCalifornia Colorado Hawaii Illinois Maryland Minnesota New Jersey New York Washington Vermont and the District of Columbia. The base pay range for this position in these locations is shown below. Compensation for roles at Accenture Federal Services varies depending on a wide array of factors including but not limited to office location role skill set and level of experience. Accenture Federal Services offers a wide variety of benefits.You can find more information on benefits here. We accept applications on an on-going basis and there is no fixed deadline to apply.

The pay range for the states of California Colorado Hawaii Illinois Maryland Minnesota New Jersey New York Washington Vermont and the District of Columbia is:

$69200 - $124200 USD


Required Experience:

IC

Employment Type

Full Time

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.