SIEM Sentinel Engineer
SIEM Sentinel Engineer
- Should have strong knowledge in MS Sentinel SIEM engineering and administrative activities. People who are in operational profiles cannot apply for this position.
- Should have performed SIEM engineering role more than 4+ years. Problem solving & People management skill is required.
- Should have expertise in building custom analytical rules, tuning of analytical rules, building automation through Azure logic apps, management of entire product feature, end to end configuration.
- Should have expertise in forming KQL queries and functions for complex detection and monitoring requirements.
- Should have strong knowledge in MITRE attack framework and expertise in developing analytical rules and custom dashboards/workbooks across framework.
- Should have expertise in log management, retentions, maintenance of logs at low cost, performing access management, developing new custom dashboard based on different requirements.
- Should have proven record of implementing Sentinel advanced features, efficient log collection mechanisms, deployment and maintenance of log forwarders, maintenance of local agents.
- Should have expertise in integrating data sources which are not supported by Sentinel tool OOB. Custom parser development and ability to solve technical issues in Sentinel are must have requirements.
- Should have ability to prepare and maintain policy and procedure documentations around SIEM technology, document life cycle management skill is required.
- Should have expertise in consuming contents from content hub and management of log analytics workspace and ability to handle issues in MMA and AMA agents.
- Should have proven record of participation in customer or client reviews or global certifications regarding security controls in SIEM. Compliance and regulatory requirements understandings are good to have.
- Preference will be given for candidates completed Sentinel Ninja Level 400 Training and Certification.
- Good to have strong knowledge in Microsoft Sentinel pricing, Microsoft defender products, Microsoft Cloud services and Azure Arc.
- Should have ability to work with stakeholders to solve technical issues and also to support and deliver complex business, security and operational requirements.
- Should have ability to work with vendor technical support group and driving issues towards effective and permanent closure.
- Having knowledge and hands-on experience in Microsoft Defender XDR stack will be an added advantage.
SIEM Sentinel Engineer
- Should have strong knowledge in MS Sentinel SIEM engineering and administrative activities. People who are in operational profiles cannot apply for this position.
- Should have performed SIEM engineering role more than 4+ years. Problem solving & People management skill is required.
- Should have expertise in building custom analytical rules, tuning of analytical rules, building automation through Azure logic apps, management of entire product feature, end to end configuration.
- Should have expertise in forming KQL queries and functions for complex detection and monitoring requirements.
- Should have strong knowledge in MITRE attack framework and expertise in developing analytical rules and custom dashboards/workbooks across framework.
- Should have expertise in log management, retentions, maintenance of logs at low cost, performing access management, developing new custom dashboard based on different requirements.
- Should have proven record of implementing Sentinel advanced features, efficient log collection mechanisms, deployment and maintenance of log forwarders, maintenance of local agents.
- Should have expertise in integrating data sources which are not supported by Sentinel tool OOB. Custom parser development and ability to solve technical issues in Sentinel are must have requirements.
- Should have ability to prepare and maintain policy and procedure documentations around SIEM technology, document life cycle management skill is required.
- Should have expertise in consuming contents from content hub and management of log analytics workspace and ability to handle issues in MMA and AMA agents.
- Should have proven record of participation in customer or client reviews or global certifications regarding security controls in SIEM. Compliance and regulatory requirements understandings are good to have.
- Preference will be given for candidates completed Sentinel Ninja Level 400 Training and Certification.
- Good to have strong knowledge in Microsoft Sentinel pricing, Microsoft defender products, Microsoft Cloud services and Azure Arc.
- Should have ability to work with stakeholders to solve technical issues and also to support and deliver complex business, security and operational requirements.
- Should have ability to work with vendor technical support group and driving issues towards effective and permanent closure.
- Having knowledge and hands-on experience in Microsoft Defender XDR stack will be an added advantage.