Related skills
azure linux mitre att&ck microsoft sentinel azure logic apps📋 Description
- Administer Microsoft Sentinel and Defender XDR for multiple clients
- Monitor health of log ingestion pipelines and analytics rules
- Onboard new data sources per SOPs; validate connectivity and parsing
- Integrate Defender data sources: Endpoint, Identity, Office 365, Cloud Apps
- Develop/detect rules with KQL; map detections to MITRE ATT&CK
- Monitor alerts; provide Tier 2 triage and incident support
🎯 Requirements
- Diploma or Bachelor’s in CS/Cybersecurity/IT or related
- 3–5 years in IT security, SOC, or security engineering
- 2+ years hands-on with Microsoft Sentinel
- Experience with Microsoft Defender XDR suite
- Azure Logic Apps, REST APIs, PowerShell or Python scripting
- Exposure to multi-tenant environments (Azure Lighthouse preferred)
🎁 Benefits
- Hybrid work model - 2–3 days in office
- Medical Insurance - Employee + dependents covered
- Retirement Match Program - We invest in your future
- PTO + sick & casual leave
- Life Insurance
- Professional Development - Reimbursement program
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest — finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!