Match score not available

Remote - Sentinel Security Engineer

Remote: 
Full Remote
Contract: 
Experience: 
Mid-level (2-5 years)
Work from: 
Kansas (USA), United States

Offer summary

Qualifications:

Experience with Microsoft Sentinel or SIEM solutions., Hands-on experience developing security correlation rules., Strong understanding of network protocols and security threats., Proficiency in Kusto Query Language (KQL)., Excellent analytical and problem-solving skills..

Key responsabilities:

  • Develop and implement security correlation rules in Microsoft Sentinel.
  • Create custom workbooks, dashboards, and alerts for detection.
  • Analyze security alerts to assess threats.
  • Investigate security incidents and collaborate with response teams.
  • Maintain documentation and prepare reports on incidents.
TechFetch.com - On Demand Tech Workforce hiring platform logo
TechFetch.com - On Demand Tech Workforce hiring platform Hrtech: Human Resources + Technology SME https://www.techfetch.com/
51 - 200 Employees
See more TechFetch.com - On Demand Tech Workforce hiring platform offers

Job description

"ALL our jobs are US based and candidates must be in the US with valid US Work Authorization. Please apply on our website directly." SCE (Security Correlation Engineer) - SentinelRemote

We are seeking a highly skilled Security Correlation Engineer (SCE) with expertise in Microsoft Sentinel to join our dynamic Security Operations team. The ideal candidate will be responsible for designing, implementing, and managing complex security correlation rules and use cases to enhance our organization's security posture. You will work closely with other security professionals to identify, analyze, and mitigate threats using Sentinel.

Key Responsibilities

Develop and implement security correlation rules and use cases within Microsoft Sentinel to detect and respond to threats.

Create and maintain custom workbooks, dashboards, and alerts tailored to organizational needs.

Design and deploy advanced analytics and threat-hunting techniques to improve incident detection capabilities.

Analyze security alerts and incidents to determine the nature and severity of potential threats.

Investigate and respond to security incidents, ensuring timely and accurate resolution.

Collaborate with the incident response team to support investigations and remediation efforts.

Integrate Sentinel with various security data sources, such as firewalls, endpoint protection, and network devices.

Optimize the performance and accuracy of security monitoring and alerting systems.

Tune and refine correlation rules to reduce false positives and improve detection efficiency.

Develop and maintain comprehensive documentation for security correlation rules, use cases, and procedures.

Prepare and present reports on security incidents, trends, and system performance to management.

Work closely with other IT and security teams to ensure seamless integration of Sentinel with existing security tools and processes.

Stay current with the latest security threats, vulnerabilities, and trends to continuously enhance the effectiveness of Sentinel deployment.

Evaluate and recommend new tools, technologies, and methodologies to improve security operations.

Qualifications And Experience

Proven experience with Microsoft Sentinel or similar SIEM solutions.

Hands-on experience in developing and managing security correlation rules, use cases, and analytics.

Strong understanding of network protocols, operating systems, and common security threats.

Proficiency in query languages such as Kusto Query Language (KQL) used in Sentinel.

Excellent analytical and problem-solving skills with a keen attention to detail.

Required profile

Experience

Level of experience: Mid-level (2-5 years)
Industry :
Hrtech: Human Resources + Technology
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Detail Oriented
  • Problem Solving
  • Analytical Skills
  • Problem Reporting

Security Engineer Related jobs