We are seeking a skilled
SOC L3 Analyst with Microsoft Sentinel Administration experience to join our cybersecurity team, focusing on delivering security services in a
Managed Security Service Provider (MSSP) environment. This role will involve managing and configuring Microsoft Sentinel to monitor and respond to security incidents across multiple clients. The ideal candidate will have strong expertise in threat detection, incident response, and SIEM administration, with experience in multi-tenant environments.
- Minimum 7 years of experience in SOC environment
- Strong experience with Microsoft Sentinel administration, including data integration, log management, and incident handling across multiple clients
- Kusto Query Language (KQL) proficiency for crafting advanced queries, optimizing detections, and conducting detailed log analyses
- Proven skills in incident response and threat hunting in complex, multi-client setups
- Familiarity with SOAR capabilities within Sentinel and automating incident response workflows using Logic Apps
- Solid understanding of network, endpoint, and cloud security principles applicable to varied client environments
Requirements
- Minimum Bachelor's Degree in Computer Science/Information Security, or a related field
- Certifications: Microsoft Certified Security Operations Analyst Associate,
- CompTIA CySA+, GIAC GCIA, GCFA, CEH or similar certifications relevant to SOC and MSSP operations is preferred