Senior SOC Analyst - Azure Sentinel & Cloud Security

Insight Global • India
Remote
Apply
AI Summary

Responsible for designing, implementing, and optimizing Azure Sentinel-based security monitoring solutions. Focuses on building scalable analytics, automation, threat detections, and integrating data from enterprise systems. Requires 3-7 years of experience in security engineering/operations with strong Azure Sentinel, KQL, and Terraform skills.

Key Highlights
100% Remote SOC Analyst role
Focus on Azure Sentinel-based security monitoring
Requires 3-7 years of experience in security engineering and operations
Key Responsibilities
Designing, implementing, and optimizing Azure Sentinel-based security monitoring solutions across cloud and hybrid environments.
Building scalable analytics, automation, threat detections, and integrating data and developing data sources from enterprise systems.
Serving as technical expertise for Azure Sentinel engineering, KQL query development, security automation (SOAR), threat detection improvements, log onboarding, optimizing log ingestion, creating efficiency and framework dashboards and reporting design.
Technical Skills Required
Microsoft Sentinel KQL Terraform Python JSON
Benefits & Perks
$5-10/hr compensation
100% Remote
Nice to Have
Azure Infrastructure/Platform service including common security services (firewalls, WAF, IDPS and RBAC).
Experience building customer analytics rules, playbooks and workbooks.
Understanding of MITRE ATT&CK, incident response and security monitoring best practices.
IoMT environments where applicable.

Job Description


100% Remote SOC Analyst

Must be local to Hyderabad or able to relocate upon conversion


JOB DESCRIPTION

The Security Operations Analyst role is responsible for designing, implementing, and optimizing Azure Sentinel-based security monitoring solutions across cloud and hybrid environments. This role focuses on building scalable analytics, automation, threat detections, and integrating data and developing data sources from enterprise systems—including Azure, M365, network security tools, serverless applications, containerized resources and IoMT environments where applicable. This role serves as a technical expertise for Azure Sentinel engineering, KQL query development, security automation (SOAR), threat detection improvements, log onboarding, optimizing log ingestion, creating efficiency and framework dashboards and reporting design to support a high-maturity SOC.

Compensation: $5-10/hr Exact compensation may vary based on several factors, including skills, experience, and education.


REQUIRED SKILLS AND EXPERIENCE

• 3 to 7 years of experience in Security engineering and Security operations.

• Bachelor's degree in Computer Science, information technology, cybersecurity, or related area

• 3 years of hands-on experience with Microsoft Sentinel, KQL and terraform.

• Strong understanding of Azure ecosystems and Azure Infrastructure/Platform service including common security services (firewalls, WAF, IDPS and RBAC).

• Experience building customer analytics rules, playbooks and workbooks.

• Understanding of MITRE ATT&CK, incident response and security monitoring best practices.

• Experience with scripting and query languages like Python, Terraform, JSON and KQL.


Similar Jobs

Explore other opportunities that match your interests

Manager of Cybersecurity

Cyber Security
•
1w ago

Premium Job

Sign up is free! Login or Sign up to view full details.

•••••• •••••• ••••••
Job Type ••••••
Experience Level ••••••

CONMED Corporation

India

Senior Network Security Engineer

Cyber Security
•
1w ago
Visa Sponsorship Relocation Remote
Job Type Contract
Experience Level Mid-Senior level

Socium - Teams Done Differentl...

India

Remote Security Compliance Analyst

Cyber Security
•
1w ago
Visa Sponsorship Relocation Remote
Job Type Full-time
Experience Level Mid-Senior level

Jobgether

India

Subscribe our newsletter

New Things Will Always Update Regularly