Job Description
- Utilise your MS Sentinel / MS Defender expertise
- Engagement through to June 2025 (potential to extend)
- Chance to join an enterprise environment
Our customer seeks a Senior SOC Analyst / Senior SOC Engineer to help them deal with and triage Cyber Incidents.
Ideally you will be in a Level 2 or Level 3 SOC role or may operating as a Cyber Incident Response Engineer currently.
Skill-sets and experience we seek includes:
Ideally you will be in a Level 2 or Level 3 SOC role or may operating as a Cyber Incident Response Engineer currently.
Skill-sets and experience we seek includes:
- Strong MS Sentinel expertise (been using it for a number of years)
- Microsoft Sentinel Logic App Exposure
- Strong MS Defender (know the whole Defender suite and have configured aspects of entire suite)
- Azure Lighthouse knowledge (useful to have but not an absolute must have)
- Strong knowledge of cyber security practices in a hybrid environment of on-premise, SaaS, and cloud services, preferably in an operation and/or incident management role.
- Strong experience with creating analytical queries, playbooks and automation rules.
- Past experience mentoring other security analysts
- Excellent oral & written technical communication skills
- Ability to identify and mitigate network vulnerabilities and explain how to avoid them
- Experience with both technical and operational support areas covering a broad range of security technologies, such as SIEM, firewalls, networking, system administration and scripting.