#717988BR
xcites you
Required Technical and Professional Expertise
Proficient with Azure Sentinel focusing primarily on SIEM (security information and event manager) for monitoring, XDR (Extended Detection and Response) for incident response actions
Possess knowledge of a Security Operations Center (SOC) operations
Must have technology experiences: Azure Sentinel, Azure Sentinel SOAR, Azure Playbooks, KQL Queries
Sound Knowledge on JavaScript, C#, KQL or SQL development background
Possess knowledge on log management, logs generated by various applications or appliances of IT infrastructure for SIEM event correlation
Ability to define various SIEM use cases based on IT environment for better detection of anomalies
Tools : Azure Sentinel, Log Analysis, KQL, Automation, SOAR
Strong understanding of the SOC KPIs, establish SOC performance goals and priorities
Manages security teams, monitors threat, implements security policies, and collaborates with other departments to ensure a comprehensive security posture.
Understanding of the cybersecurity framework such as NIST, MITRE ATT&CK(attack lifecycle management)
Manage communications, escalations, including taking corrective action for remediation.
Excellent written and Verbal communication skill
Knowledge on SOC automation related skills
Knowledge of handling and using threat intelligence feeds for threat detection purposes. • Critical Incident lifecycle Management and Reporting Operations Management, Stakeholder Management and Vendor Management
IT Security Certifications like CISSP, CISM, etc.
Preferred Technical and Professional Expertise