Relevant Work Experience:
- Security Operations Center 2nd/3rd level experience (min 2 years)
- Identity and Access Management administration and operations
Role Description / Tasks:
- Microsoft XDR solutions (Microsoft Defender, Sentinel, and other relevant tools).
- Monitor and analyze security events and alerts generated by XDR solutions to identify potential security incidents.
- Conduct advanced threat hunting and investigations using Microsoft XDR tools to detect and respond to threats.
- Develop and implement XDR use cases, detection rules, and automated response workflows to improve threat detection and response capabilities.
- Ensure adherence to industry security standards (NIST, ISO 27001, CIS, PCI-DSS, etc.) and best practices across the organization.
- Develop, maintain, and enforce security policies, procedures, and guidelines in alignment with industry standards.
- Work with cross-functional teams to implement security controls and ensure they are effective and up to date.
- Collaborate with IT and other business units to remediate vulnerabilities and mitigate risks promptly.
- Assist in developing and delivering security awareness training programs to increase cybersecurity knowledge across the organization.
- Stay up to date with the latest security threats, vulnerabilities, and trends, and share insights with relevant stakeholders.
- Provide recommendations for improving the organization's security posture based on analysis and trend data.
- Collaborate with IT, DevOps, and other business units to provide guidance on secure configurations, architecture, and design.
Qualifications / Skills:
Must haves:
- Strong communication skills to convey complex security concepts to non-technical stakeholders.
- Ability to work independently and as part of an international team
- Attention to detail and a proactive approach to security challenges.
- Excellent analytical and problem-solving skills with the ability to think critically in high-pressure situations.
- Hands-on experience with Microsoft XDR technologies (e.g., Microsoft Defender, Sentinel, Azure Security Center).
- Strong understanding of SIEM technologies and security monitoring processes.
- Familiarity with scripting languages (e.g., PowerShell, Python) for automation of security tasks.
- Familiarity with operating systems architecture - Windows, Linux, MacOS
- In-depth knowledge of security frameworks, standards, and best practices (NIST CSF, ISO 27001, CIS Controls, PCI-DSS).
- Fundamental Microsoft Azure and Microsoft 365 knowledge incl. Active Directory and Entra ID
- Knowledge of networking and cloud computing concepts
- Understanding for Rights and Roles permission concepts including creating Authorization designs
- Experience with Identity access management systems
Nice-to-haves:
- Experience in threat hunting and incident response.
- Previous experience in a SOC environment or working with managed security services.
- Experience with cloud security, particularly Azure Cloud.
- Experience with Fortinet