https://bayt.page.link/ifubWhrK3c9ZtU3x5
Create a job alert for similar positions

Job Description

We are seeking a skilled SOC L3 Analyst with Microsoft Sentinel Administration experience to join our cybersecurity team, focusing on delivering security services in a Managed Security Service Provider (MSSP) environment. This role will involve managing and configuring Microsoft Sentinel to monitor and respond to security incidents across multiple clients. The ideal candidate will have strong expertise in threat detection, incident response, and SIEM administration, with experience in multi-tenant environments.


  • Minimum 7 years of experience in SOC environment
  • Strong experience with Microsoft Sentinel administration, including data integration, log management, and incident handling across multiple clients.
  • Kusto Query Language (KQL) proficiency for crafting advanced queries, optimizing detections, and conducting detailed log analyses.
  • Proven skills in incident response and threat hunting in complex, multi-client setups.
  • Familiarity with SOAR capabilities within Sentinel and automating incident response workflows using Logic Apps.
  • Solid understanding of network, endpoint, and cloud security principles applicable to varied client environments.
You have reached your limit of 15 Job Alerts. To create a new Job Alert, delete one of your existing Job Alerts first.
Similar jobs alert created successfully. You can manage alerts in settings.
Similar jobs alert disabled successfully. You can manage alerts in settings.