Company Profile
Flentas helps enterprises leverage the full potential of the Cloud through consulting and implementation services. As an organization, Flentas brings strong technology expertise and hands-on experience to drive large-scale digital transformation initiatives and scale cloud operations. We serve clients globally, supported by a passionate team of experienced Solution Architects and Technology Enthusiasts.
Job Title: SecOps Engineer (L2)
Location: Pune, India (Hybrid)
Experience: 4+ Years
Role Overview
As a SecOps L2 Engineer, you will be the technical escalation point for security incidents across our Microsoft cloud estate. You will be responsible for proactive threat hunting, fine-tuning detection rules, and automating responses to safeguard our Azure infrastructure and M365 environment. This role requires a deep understanding of the
Microsoft Unified Security Stack.
Key Responsibilities
- Incident Response & Escalation: Act as the Tier 2 lead for investigating complex security alerts escalated by L1. Perform deep-dive forensics on compromised identities, endpoints, and cloud resources.
- Sentinel Management: Manage and optimize Microsoft Sentinel (SIEM/SOAR). Write and refine Kusto Query Language (KQL) for custom detection rules, workbooks, and hunting queries.
- M365 Security Operations: Monitor and remediate threats within Microsoft 365 Defender, including:
- Defender for Endpoint: EDR/XDR response and vulnerability management.
- Defender for Office 365: Investigating sophisticated phishing and BEC attacks.
- Defender for Identity: Monitoring lateral movement and AD/Entra ID threats.
- Azure Infrastructure Security: Utilize Microsoft Defender for Cloud to maintain cloud security posture (CSPM) and protect workloads (CWPP) across subscriptions.
- Automation & Orchestration: Build and maintain Sentinel Playbooks (Logic Apps) to automate repetitive remediation tasks and reduce Mean Time to Respond (MTTR).
- Identity Security: Monitor Microsoft Entra ID (formerly Azure AD) for risky sign-ins, manage Conditional Access policy triggers, and oversee Privileged Identity Management (PIM) alerts.
Technical Requirements
- SIEM/SOAR: Expert-level experience with Microsoft Sentinel and KQL.
- Cloud Platform: Strong hands-on experience with Azure Security Center / Defender for Cloud.
- M365 Suite: Deep knowledge of the Microsoft 365 Defender portal and Purview (for data loss prevention).
- Identity: Proficiency in Microsoft Entra ID, including Identity Protection and Governance.
- Scripting: Ability to automate tasks using PowerShell or Python.
- Network Security: Understanding of Azure Firewall, NSGs, and WAF logs.
Preferred Certifications
- AZ-500: Microsoft Azure Security Technologies.
- SC-200: Microsoft Security Operations Analyst.
- SC-300: Microsoft Identity and Access Administrator.
Preferred Soft Skills
- Strong analytical mindset with a focus on connecting the dots between disparate alerts.
- Excellent communication skills for documenting incidents and collaborating with DevOps/Infrastructure teams.
Ability to work in a 24/7 rotational environment if required.