Microsoft Sentinel Consultant

Remote · Full-time · Senior

About The Position

The ideal candidate will have a solid background in cybersecurity, especially in using Microsoft security tools and services. Demonstrable experience in scripting, security systems integration, rule creation, and cost optimization is essential.

Part-time position, hourly rate

We Offer:

  • People-oriented management without bureaucracy
  • The friendly climate inside the company is confirmed by the frequent comeback of previous employees
  • Full financial and legal support for private entrepreneurs
  • Free English classes with native speakers or with Ukrainian teachers (for your choice)
  • Dedicated HR

Responsibilities:

  • Implementation and Configuration of Security Solutions;
  • Add and configure data sources in Microsoft Sentinel, utilizing both Microsoft’s connector library and integrating custom data sources as required;
  • Develop, test, and deploy detection rules in Microsoft Sentinel using KQL (Kusto Query Language) to identify potential security incidents and threats;
  • Leverage scripting skills in Python or PowerShell to automate repetitive tasks and manipulate data as needed;
  • Work within a multi-tenant MDR (Managed Detection and Response) or SOC environment, collaborating with other security professionals to enhance overall security posture.

Requirements

  • A bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field. 
  • Proficient in using Microsoft Sentinel and Microsoft Log Analytics for security management and data analysis.
  • Advanced KQL (Kusto Query Language) knowledge for crafting complex queries and detection rules.
  • Experience in deploying and managing infrastructure with ARM templates or Terraform.
  • Proven track record in setting up and managing a multi-tenant MDR (Managed Detection and Response) or SOC (Security Operations Center) environment specifically using Microsoft Sentinel.
  • Demonstrable experience in adding and configuring data sources to Microsoft Sentinel, including both Microsoft’s connector library and custom data sources.
  • Experience in writing effective detection rules within Microsoft Sentinel to identify and react to security threats.
  • Skilled in using Azure Logic Apps for automating security workflows and responses.
  • Scripting experience with Python or PowerShell to automate tasks and process data.
  • Familiarity with log management tools such as Logstash or Filebeat is beneficial but optional.


Our next steps:

 ✅ Submit a CV in English — ✅ Intro call with a Recruiter — ✅ The client interview— ✅ Test task — ✅ Offer