Job Description
- Engagement to the end of June 2025 (potential to extend)
- Utilise your Incident / SOC expertise
- MS environment - Defender / Sentinel / Azure
Our customer seeks a Senior SOC Analyst / Senior Cyber Incident Analyst to help them deal with and triage Cyber Incidents.
Ideally you will be in a "Level 2" or "Level 3" role or worked at that level before
Skill-sets and experience we seek includes:
Ideally you will be in a "Level 2" or "Level 3" role or worked at that level before
Skill-sets and experience we seek includes:
- Strong MS Sentinel expertise
- Microsoft Sentinel Logic App Exposure
- Strong MS Defender (know the whole Defender suite and have configured aspects of entire suite)
- Azure Lighthouse knowledge (useful to have but not an absolute must have)
- Strong knowledge of cyber security practices in a hybrid environment of on-premise, SaaS, and cloud services, preferably in an operation and/or incident management role.
- Strong experience with creating analytical queries, playbooks and automation rules.
- Excellent oral & written technical communication skills
- Ability to identify and mitigate network vulnerabilities and explain how to avoid them
- Experience with both technical and operational support areas covering a broad range of security technologies, such as SIEM, firewalls, networking, system administration and scripting.