Hiring || Microsoft Sentinel SIEM Analyst Pune

2coms

Not Interested
Bookmark
Report This Job

profile Job Location:

Pune - India

profile Monthly Salary: Not Disclosed
Posted on: 16 hours ago
Vacancies: 1 Vacancy

Job Summary

Summary:
The Microsoft Sentinel SIEM Analyst plays a critical role in safeguarding the organizations digital assets by leveraging Microsoft Sentinel to monitor detect respond to and mitigate security threats. This role requires a deep understanding of security operations advanced threat detection methodologies and the ability to automate and orchestrate responses using Azure-based tools. The analyst will actively contribute to enhancing the security posture through proactive threat hunting continuous improvement of detection rules and seamless collaboration across security and IT teams. With a strong focus on operational efficiency and incident response readiness this position ensures the timely identification and resolution of security incidents while driving innovation in security operations.

Location: Pune

Responsibilities:
  • Monitor and maintain Microsoft Sentinel environments to ensure optimal performance and reliability.
  • Develop refine and manage threat detection rules and analytics using KQL (Kusto Query Language).
  • Conduct in-depth analysis of security alerts and incidents to identify true threats and reduce false positives.
  • Design and implement automation playbooks and orchestration workflows to streamline incident response.
  • Perform proactive threat hunting using Microsoft Sentinel and integrated data sources.
  • Support incident response activities by providing timely analysis documentation and remediation guidance.
  • Collaborate with cross-functional teams to improve security visibility response times and overall security posture.
  • Continuously evaluate and enhance detection capabilities operational processes and tooling effectiveness.

Requirements

  • 5 years of hands-on experience in a security engineering or analyst role.
  • At least 2 years of specialized experience with Microsoft Sentinel as a primary SIEM platform.
  • Proficiency in KQL (Kusto Query Language) for log analysis and threat detection.
  • Experience with automation and orchestration in Azure including Azure Logic Apps and Playbooks.
  • Strong understanding of cybersecurity principles threat intelligence and attack lifecycle stages.
  • Demonstrated ability to investigate and respond to security incidents in a timely and accurate manner.
  • Excellent communication and collaboration skills with the ability to explain technical concepts to non-technical stakeholders.
  • Familiarity with cloud security best practices and integration with Azure services.
  • Certifications such as Microsoft Certified: Security Compliance and Identity Fundamentals or equivalent are a plus.



Required Skills:

Summary: The Microsoft Sentinel SIEM Analyst plays a critical role in safeguarding the organizations digital assets by leveraging Microsoft Sentinel to monitor detect respond to and mitigate security threats. This role requires a deep understanding of security operations advanced threat detection methodologies and the ability to automate and orchestrate responses using Azure-based tools. The analyst will actively contribute to enhancing the security posture through proactive threat hunting continuous improvement of detection rules and seamless collaboration across security and IT teams. With a strong focus on operational efficiency and incident response readiness this position ensures the timely identification and resolution of security incidents while driving innovation in security operations. Location: Pune Responsibilities: Monitor and maintain Microsoft Sentinel environments to ensure optimal performance and reliability. Develop refine and manage threat detection rules and analytics using KQL (Kusto Query Language). Conduct in-depth analysis of security alerts and incidents to identify true threats and reduce false positives. Design and implement automation playbooks and orchestration workflows to streamline incident response. Perform proactive threat hunting using Microsoft Sentinel and integrated data sources. Support incident response activities by providing timely analysis documentation and remediation guidance. Collaborate with cross-functional teams to improve security visibility response times and overall security posture. Continuously evaluate and enhance detection capabilities operational processes and tooling effectiveness. Requirements Requirements: 5 years of hands-on experience in a security engineering or analyst role. At least 2 years of specialized experience with Microsoft Sentinel as a primary SIEM platform. Proficiency in KQL (Kusto Query Language) for log analysis and threat detection. Experience with automation and orchestration in Azure including Azure Logic Apps and Playbooks. Strong understanding of cybersecurity principles threat intelligence and attack lifecycle stages. Demonstrated ability to investigate and respond to security incidents in a timely and accurate manner. Excellent communication and collaboration skills with the ability to explain technical concepts to non-technical stakeholders. Familiarity with cloud security best practices and integration with Azure services. Certifications such as Microsoft Certified: Security Compliance and Identity Fundamentals or equivalent are a plus


Required Education:

Graduate

Summary:The Microsoft Sentinel SIEM Analyst plays a critical role in safeguarding the organizations digital assets by leveraging Microsoft Sentinel to monitor detect respond to and mitigate security threats. This role requires a deep understanding of security operations advanced threat detection met...
View more view more

Company Industry

IT Services and IT Consulting

Key Skills

  • Client Server
  • Abinitio
  • Acting
  • Accounts Assistant Credit Control
  • Light Bus And Heavy Bus
  • Dns