Job Title: SOC Analyst - Sentinel
Contract Duration: 6 MonthsLocation: Remote (UK-based)IR35: Inside IR35
Role Overview
We are seeking a skilled SOC Analyst with expertise in Microsoft Sentinel SIEM to enhance our Security Operations Center. In this role, you will monitor, analyze, and respond to security incidents using Sentinel, ensuring robust threat detection and mitigation. You will play a key role in refining detection rules, automating workflows, and maintaining the integrity of our security posture.
Key Responsibilities
- Monitor and analyze security events in Microsoft Sentinel SIEM to identify potential threats.
- Investigate, prioritize, and respond to security incidents and alerts.
- Develop and fine-tune KQL queries and detection rules for effective threat identification.
- Create and optimize playbooks for incident response automation.
- Collaborate with IT and security teams to mitigate risks and improve security processes.
- Provide reports on security incidents, trends, and SOC performance.
Key Skills and Requirements
- Hands-on experience with Microsoft Sentinel SIEM in a SOC environment.
- Proficiency in writing and optimizing KQL queries for log analysis and threat detection.
- Strong understanding of security operations, incident response, and threat analysis.
- Familiarity with integrating Sentinel with other security tools and systems.
- Excellent troubleshooting and analytical skills.
Preferred Certifications:
- Microsoft Certified: Security, Compliance, and Identity Fundamentals (highly desirable).
- CompTIA Security+, CEH, or similar certifications (a plus).