SOC Analyst (Sentinel Expert)

6 - 8 years

0 Lacs

Posted:1 day ago| Platform: Linkedin logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

We’re seeking a Microsoft Sentinel Implementation Engineer to design, deploy, and optimize Microsoft Sentinel and Defender-based SOC environments. This role supports SOC operations by enabling efficient log ingestion, developing analytic rules, and automating detections across cloud and on-prem sources.


Key Responsibilities:

  • 6-8 years of experience in administering and optimizing

    Microsoft Sentinel

    (connectors, analytic rules, workbooks, playbooks).
  • Integrate and normalize

    log data

    from Defender, firewalls, M365, and third-party tools.
  • Build

    KQL queries

    , correlation rules, and

    SOAR automation

    (Logic Apps).
  • Optimize

    data ingestion and storage

    for performance and cost efficiency.
  • Collaborate with SOC teams to enhance

    detection coverage

    and reduce alert fatigue.
  • Maintain and fine-tune

    Microsoft Defender XDR

    integrations with Sentinel.


Preferred Skills & Certifications:

Strong KQL and PowerShell skills; familiarity with Azure Monitor, AMA, and security APIs.

SC-200

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You