Search by job, company or skills

Flentas

SecOps L2 Analyst

4-6 Years
new job description bg glownew job description bg glownew job description bg svg
  • Posted 4 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Company Profile

Flentas helps enterprises leverage the full potential of the Cloud through consulting and implementation services. As an organization, Flentas brings strong technology expertise and hands-on experience to drive large-scale digital transformation initiatives and scale cloud operations. We serve clients globally, supported by a passionate team of experienced Solution Architects and Technology Enthusiasts.

Job Title: SecOps Engineer (L2)

Location: Pune, India (Hybrid)

Experience: 4+ Years

Role Overview

As a SecOps L2 Engineer, you will be the technical escalation point for security incidents across our Microsoft cloud estate. You will be responsible for proactive threat hunting, fine-tuning detection rules, and automating responses to safeguard our Azure infrastructure and M365 environment. This role requires a deep understanding of the Microsoft Unified Security Stack.

Key Responsibilities

  • Incident Response & Escalation: Act as the Tier 2 lead for investigating complex security alerts escalated by L1. Perform deep-dive forensics on compromised identities, endpoints, and cloud resources.
  • Sentinel Management: Manage and optimize Microsoft Sentinel (SIEM/SOAR). Write and refine Kusto Query Language (KQL) for custom detection rules, workbooks, and hunting queries.
  • M365 Security Operations: Monitor and remediate threats within Microsoft 365 Defender, including:
    • Defender for Endpoint: EDR/XDR response and vulnerability management.
    • Defender for Office 365: Investigating sophisticated phishing and BEC attacks.
    • Defender for Identity: Monitoring lateral movement and AD/Entra ID threats.
  • Azure Infrastructure Security: Utilize Microsoft Defender for Cloud to maintain cloud security posture (CSPM) and protect workloads (CWPP) across subscriptions.
  • Automation & Orchestration: Build and maintain Sentinel Playbooks (Logic Apps) to automate repetitive remediation tasks and reduce Mean Time to Respond (MTTR).
  • Identity Security: Monitor Microsoft Entra ID (formerly Azure AD) for risky sign-ins, manage Conditional Access policy triggers, and oversee Privileged Identity Management (PIM) alerts.
Technical Requirements

  • SIEM/SOAR: Expert-level experience with Microsoft Sentinel and KQL.
  • Cloud Platform: Strong hands-on experience with Azure Security Center / Defender for Cloud.
  • M365 Suite: Deep knowledge of the Microsoft 365 Defender portal and Purview (for data loss prevention).
  • Identity: Proficiency in Microsoft Entra ID, including Identity Protection and Governance.
  • Scripting: Ability to automate tasks using PowerShell or Python.
  • Network Security: Understanding of Azure Firewall, NSGs, and WAF logs.

Preferred Certifications

  • AZ-500: Microsoft Azure Security Technologies.
  • SC-200: Microsoft Security Operations Analyst.
  • SC-300: Microsoft Identity and Access Administrator.

Preferred Soft Skills

  • Strong analytical mindset with a focus on connecting the dots between disparate alerts.
  • Excellent communication skills for documenting incidents and collaborating with DevOps/Infrastructure teams.

Ability to work in a 24/7 rotational environment if required.

More Info

Job Type:
Industry:
Employment Type:

About Company

Job ID: 145661761