Sentinel SIEM Engineer

  • Posted 23 hours ago | Updated 23 hours ago

Overview

Remote
Depends on Experience
Contract - W2
Contract - 12 Month(s)

Skills

Sentinel SIEM admin
SIEM
KQL
Microsoft Sentinel
Azure Data Xplore

Job Details

  • Design and Develop SIEM Use Cases in Microsoft Sentinel tailored to specific threat detection and business requirements.
  • Proven hands-on experience with Microsoft Sentinel (deployment, rule creation, tuning, and automation).
  • Strong knowledge in SIEM Use Case development, threat detection, and mitigation strategies.
  • Collaborate with SOC teams, threat hunters, and security architects to translate detection requirements into effective Sentinel analytics rules and workbooks.
  • Provide consulting expertise to guide customers and teams on Microsoft Sentinel deployment, configuration, and optimization in line with industry best practices.
  • Implement and fine-tune Kusto Query Language (KQL) queries for log analytics and rule creation.
  • Support automated incident response by developing Logic Apps and playbooks.
  • Continuously assess, improve, and document Sentinel use cases and detection logic.
  • Stay updated with Microsoft Sentinel and broader Azure security roadmap to advise on upgrades and enhancements.
  • Deep understanding of cybersecurity operations, incident response lifecycle, and threat intelligence.
  • Excellent client-facing and internal communication skills.

Microsoft Certified: Security Operations Analyst Associate or other relevant Sentinel certifications

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.