SIEM Engineer
Hyderabad
UltraViolet Cyber
Evolve your security operations into your proactive risk reducing superpower through the combination of MDR with Red Teams that validate every alert.Integration & Optimization: Integrate and optimize Microsoft Sentinel to improve visibility and automate threat detection workflowsThreat Detection: Utilize Microsoft Sentinel AI-powered analytics to dashboard reports and automate critical reporting functions Automation & Playbook Development: Develop automated detection and response playbooks based on Microsoft data feeds, streamlining incident management and reducing time to resolution. Collaboration & Knowledge Sharing: Work closely with other security and IT teams to share threat intelligence, optimize SIEM use, and contribute to security strategy development. Reporting & Documentation: Develop and maintain dashboards, reports, and documentation related to Microsoft Sentinel deployment, performance, and incident metrics. Continuous Improvement: Continuously evaluate Microsoft Sentinel capabilities and other relevant security tools to recommend improvements and refine detection capabilities. Required Qualifications: 5 years of SIEM experience in Splunk, Qradar, Microsoft, and comparable SIEMS Hands-on experience with other SIEM platforms (Splunk, IBM QRadar, Microsoft Sentinel, etc.) and integrating them with endpoint security tools. Strong understanding of cybersecurity principles, threat detection, and SIEM management. Experience working with Sentinel One Core EDR technology Proficiency in scripting and automation (Python, PowerShell, etc.). Experience with cloud security (AWS, Azure, GCP) and cloud-native SIEM solutions is a plus. Bachelor’s degree in computer science, Information Security, or a related field (or equivalent experience). Preferred Qualifications: 5 years of experience in cybersecurity in a SOC or security engineering capacity.Proven hands-on expertise with Microsoft Sentinel and Microsoft Defender suite.Deep knowledge of Kusto Query Language (KQL) and building custom analytics rules and workbooks in Sentinel.Strong experience in customer-facing roles.Experience with incident response, threat detection, and threat hunting techniques.Strong understanding of cloud security, especially in Azure environments.Familiarity with MITRE ATT&CK, NIST, and other security frameworks.Experience integrating Sentinel with third-party solutions (e.g., threat intel feeds, ticketing systems).
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics Automation AWS Azure Cloud Compliance Computer Science EDR Endpoint security GCP Incident response MITRE ATT&CK Monitoring NIST PowerShell Python QRadar Scripting Security strategy Sentinel SIEM SOC Splunk Strategy Threat detection Threat intelligence
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.