Search by job, company or skills

strongbox it - cybersecurity consulting

Microsoft Sentinel Implementation Specialist (SOC / SIEM)

new job description bg glownew job description bg glownew job description bg svg
  • Posted 3 days ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Role Summary

We are hiring a Senior Microsoft Sentinel Implementation Specialist with strong hands-on experience in SIEM deployment, log onboarding, detection engineering, and SOC optimization.

This role is implementation-heavy, requiring someone who can build, tune, and mature a Sentinel environment, not just monitor alerts. The ideal candidate should have experience working in enterprise SOC environments and be comfortable handling multi-source log integration, correlation, and automation.

Key Responsibilities1. Sentinel Implementation & Log Onboarding
  • Implement and configure Microsoft Sentinel for enterprise environments
  • Onboard logs from:
  • Firewalls, WAF, IDS/IPS, proxy
  • Endpoints (Defender / EDR tools)
  • Azure / AWS / GCP workloads
  • Entra ID (Azure AD), Active Directory
  • SaaS applications (M365, custom apps)
  • Configure data connectors, parsers, and normalization
2. Detection Engineering & Correlation
  • Develop and tune analytics rules using KQL
  • Build correlation use cases across multiple log sources
  • Map detections to MITRE ATT&CK techniques
  • Create custom detection scenarios based on real-world threats
3. Monitoring, Tuning & Noise Reduction
  • Fine-tune rules to reduce false positives and alert fatigue
  • Improve detection quality and signal-to-noise ratio
  • Establish baselines and behavioural patterns
  • Continuously optimize alerting logic
4. Incident Response & SOC Operations
  • Investigate and respond to security incidents
  • Perform root cause analysis and attack chain mapping
  • Support L2/L3 escalation handling
  • Define and improve incident response workflows
5. SOAR & Playbook Automation
  • Build and maintain Sentinel playbooks (Logic Apps)
  • Automate alert enrichment, notifications, and response actions
  • Integrate threat intelligence feeds (VirusTotal, etc.)
  • Reduce manual SOC effort through automation
6. Reporting & Dashboards
  • Create Sentinel dashboards and workbooks
  • Track metrics such as:
  • Alert volumes
  • MTTR
  • Detection coverage
  • Provide insights for SOC improvement

Must-Have Skills
  • Strong hands-on experience with Microsoft Sentinel (mandatory)
  • Good knowledge of KQL (Kusto Query Language)
  • Experience in log onboarding from multiple device types
  • Hands-on experience in SIEM rule tuning and false positive reduction
  • Exposure to incident response and SOC workflows
  • Experience with SOAR / Playbook automation (Logic Apps preferred)
Good to Have
  • Experience with Microsoft Defender Suite (XDR, Endpoint, O365, Cloud)
  • Knowledge of Entra ID (Azure AD) and identity security
  • Exposure to AWS / multi-cloud environments
  • Basic scripting (PowerShell / Python)
  • Understanding of MITRE ATT&CK framework
Certifications (Preferred)
  • SC-200 (Microsoft Security Operations Analyst)
  • AZ-500 (Azure Security Engineer)
Ideal Candidate Profile
  • Comes from a SOC / SIEM engineering background (not just monitoring)
  • Has worked on implementation or major tuning projects
  • Strong in problem solving and log analysis
  • Able to work with minimal supervision in a fast-paced environment 

More Info

Job Type:
Industry:
Function:
Employment Type:

Job ID: 145400897

Similar Jobs