Posted on: 28/01/2026
Description :
- Possessing 5 years of experience in cloud computing and cloud security roles with a minimum of 3 years specifically in Azure security roles
- Additionally there is a requirement of at least 2 years of experience in Microsoft Sentinel Azure log analytics and the development of Kusto Query Language
- Experience in the implementation of SIEM and SOAR is also necessary
- Familiarity with automation scripting is expected
- The Sentinel Engineers primary focus will be on the creation and development of SIEM and SOAR use cases The role requires realtime experience in data collection utilizing the Sentinel and Azure Log Analytics toolsets
- The candidate should have experience in connecting various log connectors using the built in log collector and should be adept at connecting on premises security logs from various sources where Sentinel lacks readymade connectors
- Knowledge of different methods for collecting security event logs such as syslog rsyslog and syslogng is essential along with hands on experience in implementing these functions
- The Engineer should also have experience in developing playbooks analytic rules workbooks notebooks incident response threat hunting and crafting KQL queries for data normalization and parsing capabilities within the Log Analytics data ingestion pipeline
- Required Technical Skills include High proficiency in Microsoft Sentinel and Azure Log Analytics Capability to connect any type of logs from any source to the Sentinel Log Analytics workspace
- Hands on experience in creating playbooks analytic rules workbooks notebooks and incident response for threat hunting
- Experience in developing KQL queries for data normalization and parsing capabilities for the Log Analytics data ingestion pipeline
- Ability to automate and integrate developed use cases into the DevOps CICD pipeline Development and automation of incident response capabilities using Azure Logic Apps
- Development of Jupyter notebooks using any scripting language such as Python to integrate with Microsoft Sentinel
Additional Skills :
- Azure Network Security
- DDoS Azure
- WAF Azure Firewall
- Experience in Sentinel MultiTenant Deployment
- Knowledge of configuring Sentinel third party connectors
- Strong understanding of MS Purview
- DLP Data Security
- Data Governance
- Data Compliance
Educational Qualification :
- BCA MCA BE BTech or equivalent
Skills : Sentinel
Did you find something suspicious?
Posted by
Posted in
CyberSecurity
Functional Area
IT Security
Job Code
1606975