Experience: 2–6 years
Location: Bengaluru / Pune / Hyderabad / Noida / Gurgaon (Hybrid or Remote options depending on role)
Employment Type: Full-time / Contract
Open Positions: 7
Role Overview
We are looking for skilled Microsoft Sentinel Engineers to design, configure, tune, and operate Microsoft Sentinel SIEM environments for enterprise clients.
The ideal candidate will have hands-on expertise in data connectors, analytics rule creation, incident triage, automation (SOAR), and security monitoring.
Key Responsibilities
- Configure and onboard logs into Microsoft Sentinel
- Create and fine-tune Analytics Rules, Hunting Queries, and Workbooks
- Build automation workflows using Logic Apps / SOAR
- Configure DCRs, watchlists, threat intelligence feeds, UEBA
- Investigate incidents & collaborate with SOC teams for response
- Create KQL-based dashboards, threat hunting queries & reports
- Integrate Sentinel with Microsoft Defender suite and third-party tools
- Participate in continuous improvement of detection & automation maturity
Required Skills
- Hands-on experience with Microsoft Sentinel SIEM
- Strong KQL query writing & log analysis
- Experience integrating Defender, Azure AD logs, O365, VM, Network logs
- Understanding of MITRE ATT&CK, SIEM Use Cases, Threat Detection
- Experience in security monitoring or SOC operations
Nice to Have
- Azure security certifications: SC-200, AZ-500, MS-500
- Defender for Endpoint / Sentinelone / CrowdStrike exposure
- SOAR orchestration experience