Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
5 years of experience in cloud computing and cloud security role
Minimum 3 years of experience in Azure security role
Minimum 2 years of experience in Microsoft Sentinel and Azure log analytics and developing Kusto Query Language Experience in SIEM and SOAR implementation
Worked on any automation script
The Sentinel Engineer has to focus mainly on the SIEM and SOAR Use case creation and development should also have real time experience in data collection using the sentinel and Azure Log Analytics toolsets Should have experience in connecting various Log connector using the inbuilt log collector should have experience in connecting the Onprem security logs from various source where sentinel dont have any readymade connector Should have knowledge on different method of collecting security event logs like syslog rsyslog syslogng and have hands on experience in implementing these functions The Engineer should have the experience in developing playbook analytic rule workbooks notebooks incident Threat hunting developing KQL queries for data normalization and parsing capability for Log Analytics data ingestion pipeline
Required Technical Skills
Highly proficient in Microsoft Sentinel and Azure Log Analytics
Able to connect any type of logs and from any type of source to SentinelLog Analytic work space
Should have hands on experience in creating playbook analytic rule workbooks notebooks incident Threat hunting
Should have experience in developing KQL queries for data normalization and parsing capability for Log Analytics data ingestion pipeline
Able to automate and integrate developed use cases into DevOps CICD pipeline
Develop and automate incident response capability using the Azure Logic Apps
Develop Jupyter notebooks using any scriptpython and to integrate with Microsoft Sentinel
Mandatory Skills : Sentinel
Key Skills
Ranked by relevanceReady to apply?
Join PRIMUS Global Solutions (PRIMUS UK & Europe) and take your career to the next level!
Application takes less than 5 minutes

