Job Title: Software Developer 2 (Onsite)
Location: Austin TX
Duration: 12 Months
Job Description:
The Software Developer II performs advanced (senior-level) software development work focused on designing building testing and optimizing Microsoft Sentinel capabilities for client projects. This role is responsible for developing custom automation playbooks analytics rules behavioral models connectors and integrations to support SOAR and UEBA functionality. The position works under limited supervision with considerable latitude for initiative independent judgment and technical leadership.
Essential Job Functions (EJFs)
- Microsoft Sentinel SOAR Development (40%)
- Designs develops tests and deploys Sentinel SOAR automation playbooks using Azure Logic Apps Azure Functions ARM templates and REST APIs.
- Creates automated workflows for alert enrichment triage response actions notification processes and case management.
- Integrates Sentinel with third-party systems (EDR IAM ticketing systems email gateways firewalls etc.) to automate security operations.
- UEBA & Analytics Engineering (30%)
- Develops custom UEBA detection rules anomaly models ML-based behavior patterns and advanced hunting queries (KQL).
- Builds and maintains analytics content data parsers normalization rules and entity behavior profiles.
- Evaluates behavioral anomalies and collaborates with cybersecurity teams to fine-tune detection logic.
- SIEM Content Development & Platform Engineering (15%)
- Designs and implements custom data connectors ingestion pipelines and data transformation logic.
- Creates dashboards workbooks hunting queries and detection-as-code assets.
- Performs platform tuning to improve performance reduce noise and align to MITRE ATT&CK and Zero Trust principles.
- Application Development & Integration (10%)
- Develops supporting code modules scripts microservices and helper APIs using Python or similar languages.
- Works with DevOps pipelines CI/CD processes version control and infrastructure-as-code where applicable.
- Documentation Collaboration & Support (5%)
- Writes technical design documents SOPs architecture diagrams and automation runbooks.
- Collaborate with the client and cross-functional stakeholders on requirements testing and deployment.
- Provides Tier III support for Sentinel engineering issues and participates in after-action reviews when needed.
Knowledge Skills and Abilities (KSAs):
Knowledge of:
- Microsoft Sentinel architecture SOAR and UEBA capabilities.
- Azure cloud services Logic Apps Azure Functions Event Hubs Key Vault and Azure AD.
- Security operations processes (triage threat detection incident response threat modeling).
- MITRE ATT&CK NIST CSF Zero Trust Architecture concepts.
- Programming and scripting languages (Python PowerShell KQL C# JavaScript or equivalent).
- CI/CD pipelines DevOps practices and Git-based version control.
- API integrations and JSON/YAML structures.
Skills in:
- Building Logic App workflows and custom Sentinel automation playbooks.
- Writing complex KQL queries for analytics hunting and behavioral detection.
- Developing custom connectors data maps and parsers.
- Designing and optimizing UEBA detection models.
- Debugging SOAR workflows and resolving integration issues.
- Communicating technical information clearly to both technical and non-technical audiences.
Abilities to:
- Work independently and take ownership of complex development tasks.
- Translate security requirements into scalable technical solutions.
- Analyze threat behaviors and develop meaningful detections.
- Work collaboratively with cybersecurity infrastructure and application teams.
- Manage multiple work assignments and meet deadlines.
Candidate Skills and Qualifications:
| Minimum Requirements: Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity. |
| Years | Required/Preferred | Experience |
| 4 | Required | Graduation from an accredited four-year college or university with major coursework in computer science computer information systems software engineering cybersecurity or a related field. |
| 2 | Required | Two (2) years of full-time experience in software development cloud engineering SIEM engineering or cybersecurity engineering. |
| 2 | Required | Two (2) years of full-time experience in software development cloud engineering SIEM engineering or cybersecurity engineering. |
| 3 | Preferred | Three (3) or more years of hands-on technical experience with Microsoft Sentinel. |
| 1 | Preferred | Experience developing UEBA models anomaly detection rules and behavior-based analytics. |
| 1 | Preferred | Experience building Security Automation Playbooks (SOAR). |
| 1 | Preferred | Microsoft certifications such as: SC-200: Security Operations Analyst AZ-900 / AZ-104 SC-100 / SC-300 |
| 1 | Preferred | Experience integrating Sentinel with EDR IAM firewalls and ticketing systems. |
| 1 | Preferred | Experience with DevOps pipelines (GitHub Azure DevOps). |
| 1 | Preferred | Experience working in a government healthcare or regulatory environment. |
Job Title: Software Developer 2 (Onsite) Location: Austin TX Duration: 12 Months Job Description: The Software Developer II performs advanced (senior-level) software development work focused on designing building testing and optimizing Microsoft Sentinel capabilities for client projects. This rol...
Job Title: Software Developer 2 (Onsite)
Location: Austin TX
Duration: 12 Months
Job Description:
The Software Developer II performs advanced (senior-level) software development work focused on designing building testing and optimizing Microsoft Sentinel capabilities for client projects. This role is responsible for developing custom automation playbooks analytics rules behavioral models connectors and integrations to support SOAR and UEBA functionality. The position works under limited supervision with considerable latitude for initiative independent judgment and technical leadership.
Essential Job Functions (EJFs)
- Microsoft Sentinel SOAR Development (40%)
- Designs develops tests and deploys Sentinel SOAR automation playbooks using Azure Logic Apps Azure Functions ARM templates and REST APIs.
- Creates automated workflows for alert enrichment triage response actions notification processes and case management.
- Integrates Sentinel with third-party systems (EDR IAM ticketing systems email gateways firewalls etc.) to automate security operations.
- UEBA & Analytics Engineering (30%)
- Develops custom UEBA detection rules anomaly models ML-based behavior patterns and advanced hunting queries (KQL).
- Builds and maintains analytics content data parsers normalization rules and entity behavior profiles.
- Evaluates behavioral anomalies and collaborates with cybersecurity teams to fine-tune detection logic.
- SIEM Content Development & Platform Engineering (15%)
- Designs and implements custom data connectors ingestion pipelines and data transformation logic.
- Creates dashboards workbooks hunting queries and detection-as-code assets.
- Performs platform tuning to improve performance reduce noise and align to MITRE ATT&CK and Zero Trust principles.
- Application Development & Integration (10%)
- Develops supporting code modules scripts microservices and helper APIs using Python or similar languages.
- Works with DevOps pipelines CI/CD processes version control and infrastructure-as-code where applicable.
- Documentation Collaboration & Support (5%)
- Writes technical design documents SOPs architecture diagrams and automation runbooks.
- Collaborate with the client and cross-functional stakeholders on requirements testing and deployment.
- Provides Tier III support for Sentinel engineering issues and participates in after-action reviews when needed.
Knowledge Skills and Abilities (KSAs):
Knowledge of:
- Microsoft Sentinel architecture SOAR and UEBA capabilities.
- Azure cloud services Logic Apps Azure Functions Event Hubs Key Vault and Azure AD.
- Security operations processes (triage threat detection incident response threat modeling).
- MITRE ATT&CK NIST CSF Zero Trust Architecture concepts.
- Programming and scripting languages (Python PowerShell KQL C# JavaScript or equivalent).
- CI/CD pipelines DevOps practices and Git-based version control.
- API integrations and JSON/YAML structures.
Skills in:
- Building Logic App workflows and custom Sentinel automation playbooks.
- Writing complex KQL queries for analytics hunting and behavioral detection.
- Developing custom connectors data maps and parsers.
- Designing and optimizing UEBA detection models.
- Debugging SOAR workflows and resolving integration issues.
- Communicating technical information clearly to both technical and non-technical audiences.
Abilities to:
- Work independently and take ownership of complex development tasks.
- Translate security requirements into scalable technical solutions.
- Analyze threat behaviors and develop meaningful detections.
- Work collaboratively with cybersecurity infrastructure and application teams.
- Manage multiple work assignments and meet deadlines.
Candidate Skills and Qualifications:
| Minimum Requirements: Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity. |
| Years | Required/Preferred | Experience |
| 4 | Required | Graduation from an accredited four-year college or university with major coursework in computer science computer information systems software engineering cybersecurity or a related field. |
| 2 | Required | Two (2) years of full-time experience in software development cloud engineering SIEM engineering or cybersecurity engineering. |
| 2 | Required | Two (2) years of full-time experience in software development cloud engineering SIEM engineering or cybersecurity engineering. |
| 3 | Preferred | Three (3) or more years of hands-on technical experience with Microsoft Sentinel. |
| 1 | Preferred | Experience developing UEBA models anomaly detection rules and behavior-based analytics. |
| 1 | Preferred | Experience building Security Automation Playbooks (SOAR). |
| 1 | Preferred | Microsoft certifications such as: SC-200: Security Operations Analyst AZ-900 / AZ-104 SC-100 / SC-300 |
| 1 | Preferred | Experience integrating Sentinel with EDR IAM firewalls and ticketing systems. |
| 1 | Preferred | Experience with DevOps pipelines (GitHub Azure DevOps). |
| 1 | Preferred | Experience working in a government healthcare or regulatory environment. |
View more
View less