Overview
On Site
Hourly
Contract - W2
Skills
ARM
Machine Learning (ML)
Normalization
Content Development
Dashboard
Application Development
Microservices
.NET
Documentation
Collaboration
Technical Drafting
Testing
Incident Management
Threat Modeling
Scripting
Python
Windows PowerShell
C#
JavaScript
Continuous Integration
Continuous Delivery
Git
Version Control
API
JSON
YAML
Writing
Debugging
Workflow
Management
Computer Science
Information Systems
Software Engineering
Software Development
Cloud Computing
SIEM
Cyber Security
Analytics
Microsoft
Security Operations
Firewall
GitHub
Microsoft Azure
DevOps
Health Care
DICE
Job Details
City : Austin
State : Texas
Neos is Seeking a Senior Microsoft Sentinel Engineer for a contract role for with our client in Austin, TX.
***ONSITE - ONLY CANDIDATES CURRENTLY RESIDING IN THE AUSTIN, TX AREA WILL BE CONSIDERED***
Position is ONSITE (no remote work) and will be at 701 W. 51st, Austin, Texas 78751
Interviews will be conducted both via Teams and ONSITE in AUSTIN
No calls, no emails, please respond directly to the "apply" link with your resume and contact details.
Essential Job Functions (EJFs)
1. Microsoft Sentinel SOAR Development (40%)
Designs, develops, tests, and deploys Sentinel SOAR automation playbooks using Azure Logic Apps, Azure Functions, ARM templates, and REST APIs.
Creates automated workflows for alert enrichment, triage, response actions, notification processes, and case management.
Integrates Sentinel with third-party systems (EDR, IAM, ticketing systems, email gateways, firewalls, etc.) to automate security operations.
2. UEBA & Analytics Engineering (30%)
Develops custom UEBA detection rules, anomaly models, ML-based behavior patterns, and advanced hunting queries (KQL).
Builds and maintains analytics content, data parsers, normalization rules, and entity behavior profiles.
Evaluates behavioral anomalies and collaborates with cybersecurity teams to fine-tune detection logic.
3. SIEM Content Development & Platform Engineering (15%)
Designs and implements custom data connectors, ingestion pipelines, and data transformation logic.
Creates dashboards, workbooks, hunting queries, and detection-as-code assets.
Performs platform tuning to improve performance, reduce noise, and align to MITRE ATT&CK and Zero Trust principles.
4. Application Development & Integration (10%)
Develops supporting code modules, scripts, microservices, and helper APIs using Python, PowerShell, .NET, or similar languages.
Works with DevOps pipelines, CI/CD processes, version control, and infrastructure-as-code where applicable.
5. Documentation, Collaboration & Support (5%)
Writes technical design documents, SOPs, architecture diagrams, and automation runbooks.
Collaborates with DSHS, HHSC CISO Office, and cross-functional stakeholders on requirements, testing, and deployment.
Provides Tier III support for Sentinel engineering issues and participates in after-action reviews when needed.
Knowledge, Skills, and Abilities (KSAs)
Knowledge of:
Microsoft Sentinel architecture, SOAR, and UEBA capabilities.
Azure cloud services, Logic Apps, Azure Functions, Event Hubs, Key Vault, and Azure AD.
Security operations processes (triage, threat detection, incident response, threat modeling).
MITRE ATT&CK, NIST CSF, Zero Trust Architecture concepts.
Programming and scripting languages (Python, PowerShell, KQL, C#, JavaScript, or equivalent).
CI/CD pipelines, DevOps practices, and Git-based version control.
API integrations and JSON/YAML structures.
Skills in:
Building Logic App workflows and custom Sentinel automation playbooks.
Writing complex KQL queries for analytics, hunting, and behavioral detection.
Developing custom connectors, data maps, and parsers.
Designing and optimizing UEBA detection models.
Debugging SOAR workflows and resolving integration issues.
Communicating technical information clearly to both technical and non-technical audiences.
Abilities to:
Work independently and take ownership of complex development tasks.
Translate security requirements into scalable technical solutions.
Analyze threat behaviors and develop meaningful detections.
Work collaboratively with cybersecurity, infrastructure, and application teams.
Manage multiple work assignments and meet deadlines.
CANDIDATE SKILLS AND QUALIFICATIONS
4 years Required - Graduation from an accredited four-year college or university with major coursework in computer science, computer information systems, software engineering, cybersecurity, or a related field.
2 years Required - Two (2) years of full-time experience in software development, cloud engineering, SIEM engineering, or cybersecurity engineering.
2 years Required - Two (2) years of full-time experience in software development, cloud engineering, SIEM engineering, or cybersecurity engineering.
Preferred Qualifications
3 years Preferred - Three (3) or more years of hands-on technical experience with Microsoft Sentinel.
1 year Preferred - Experience developing UEBA models, anomaly detection rules, and behavior-based analytics.
1 year Preferred - Experience building Security Automation Playbooks (SOAR).
1 year Preferred - Microsoft certifications such as: SC-200: Security Operations Analyst, AZ-900 / AZ-104, SC-100 / SC-300
1 year Preferred - Experience integrating Sentinel with EDR, IAM, firewalls, and ticketing systems.
1 year Preferred - Experience with DevOps pipelines (GitHub, Azure DevOps).
1 year Preferred - Experience working in a government, healthcare, or regulatory environment.
#DICE
#LI-MF
State : Texas
Neos is Seeking a Senior Microsoft Sentinel Engineer for a contract role for with our client in Austin, TX.
***ONSITE - ONLY CANDIDATES CURRENTLY RESIDING IN THE AUSTIN, TX AREA WILL BE CONSIDERED***
Position is ONSITE (no remote work) and will be at 701 W. 51st, Austin, Texas 78751
Interviews will be conducted both via Teams and ONSITE in AUSTIN
No calls, no emails, please respond directly to the "apply" link with your resume and contact details.
Essential Job Functions (EJFs)
1. Microsoft Sentinel SOAR Development (40%)
Designs, develops, tests, and deploys Sentinel SOAR automation playbooks using Azure Logic Apps, Azure Functions, ARM templates, and REST APIs.
Creates automated workflows for alert enrichment, triage, response actions, notification processes, and case management.
Integrates Sentinel with third-party systems (EDR, IAM, ticketing systems, email gateways, firewalls, etc.) to automate security operations.
2. UEBA & Analytics Engineering (30%)
Develops custom UEBA detection rules, anomaly models, ML-based behavior patterns, and advanced hunting queries (KQL).
Builds and maintains analytics content, data parsers, normalization rules, and entity behavior profiles.
Evaluates behavioral anomalies and collaborates with cybersecurity teams to fine-tune detection logic.
3. SIEM Content Development & Platform Engineering (15%)
Designs and implements custom data connectors, ingestion pipelines, and data transformation logic.
Creates dashboards, workbooks, hunting queries, and detection-as-code assets.
Performs platform tuning to improve performance, reduce noise, and align to MITRE ATT&CK and Zero Trust principles.
4. Application Development & Integration (10%)
Develops supporting code modules, scripts, microservices, and helper APIs using Python, PowerShell, .NET, or similar languages.
Works with DevOps pipelines, CI/CD processes, version control, and infrastructure-as-code where applicable.
5. Documentation, Collaboration & Support (5%)
Writes technical design documents, SOPs, architecture diagrams, and automation runbooks.
Collaborates with DSHS, HHSC CISO Office, and cross-functional stakeholders on requirements, testing, and deployment.
Provides Tier III support for Sentinel engineering issues and participates in after-action reviews when needed.
Knowledge, Skills, and Abilities (KSAs)
Knowledge of:
Microsoft Sentinel architecture, SOAR, and UEBA capabilities.
Azure cloud services, Logic Apps, Azure Functions, Event Hubs, Key Vault, and Azure AD.
Security operations processes (triage, threat detection, incident response, threat modeling).
MITRE ATT&CK, NIST CSF, Zero Trust Architecture concepts.
Programming and scripting languages (Python, PowerShell, KQL, C#, JavaScript, or equivalent).
CI/CD pipelines, DevOps practices, and Git-based version control.
API integrations and JSON/YAML structures.
Skills in:
Building Logic App workflows and custom Sentinel automation playbooks.
Writing complex KQL queries for analytics, hunting, and behavioral detection.
Developing custom connectors, data maps, and parsers.
Designing and optimizing UEBA detection models.
Debugging SOAR workflows and resolving integration issues.
Communicating technical information clearly to both technical and non-technical audiences.
Abilities to:
Work independently and take ownership of complex development tasks.
Translate security requirements into scalable technical solutions.
Analyze threat behaviors and develop meaningful detections.
Work collaboratively with cybersecurity, infrastructure, and application teams.
Manage multiple work assignments and meet deadlines.
CANDIDATE SKILLS AND QUALIFICATIONS
4 years Required - Graduation from an accredited four-year college or university with major coursework in computer science, computer information systems, software engineering, cybersecurity, or a related field.
2 years Required - Two (2) years of full-time experience in software development, cloud engineering, SIEM engineering, or cybersecurity engineering.
2 years Required - Two (2) years of full-time experience in software development, cloud engineering, SIEM engineering, or cybersecurity engineering.
Preferred Qualifications
3 years Preferred - Three (3) or more years of hands-on technical experience with Microsoft Sentinel.
1 year Preferred - Experience developing UEBA models, anomaly detection rules, and behavior-based analytics.
1 year Preferred - Experience building Security Automation Playbooks (SOAR).
1 year Preferred - Microsoft certifications such as: SC-200: Security Operations Analyst, AZ-900 / AZ-104, SC-100 / SC-300
1 year Preferred - Experience integrating Sentinel with EDR, IAM, firewalls, and ticketing systems.
1 year Preferred - Experience with DevOps pipelines (GitHub, Azure DevOps).
1 year Preferred - Experience working in a government, healthcare, or regulatory environment.
#DICE
#LI-MF
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.