TE

Microsoft Sentinel Security Analyst

Teamware Solutions
Chennai5-7 LPA Posted 16 Jul 2025
FULL TIME
Azure
Automation
Python
Powershell

Job Description

Key Responsibilities:

  • Monitor security alerts, events, and logs within Microsoft Sentinel to detect, analyze, and respond to potential threats.
  • Develop, tune, and optimize KQL (Kusto Query Language) queries and analytic rules for effective threat detection.
  • Conduct proactive threat hunting and vulnerability assessments within the Azure environment.
  • Investigate security incidents, perform root cause analysis, and recommend remediation steps.
  • Collaborate with SOC analysts, IT teams, and stakeholders to escalate and resolve security incidents.
  • Maintain and update playbooks and automation workflows using Azure Logic Apps and Sentinel SOAR capabilities.
  • Generate and present regular security reports and dashboards to management.
  • Stay current with the latest cyber threats, vulnerabilities, and best practices in cloud security.
  • Assist with compliance audits and ensure adherence to security policies and standards.

Qualifications and Requirements:

  • Bachelor's degree in Cybersecurity, Computer Science, or a related field (or equivalent experience).
  • 3+ years of experience in cybersecurity, preferably within a Security Operations Center (SOC).
  • Hands-on experience with Microsoft Sentinel and Azure security services (Azure Security Center, Azure Defender).
  • Proficient in Kusto Query Language (KQL) for writing complex detection rules and queries.
  • Familiarity with cloud security principles, identity and access management (IAM), and network security.
  • Experience with incident response, threat hunting, and malware analysis.
  • Knowledge of security frameworks such as NIST, MITRE ATT&CK, CIS, or ISO 27001.
  • Strong analytical, problem-solving, and communication skills.

Desirable Skills and Certifications:

  • Certifications such as Microsoft Certified: Azure Security Engineer Associate, Certified SOC Analyst (CSA), GIAC Certified Incident Handler (GCIH), or CompTIA Security+.
  • Experience with SOAR platforms and automation tools.
  • Familiarity with scripting languages (PowerShell, Python) for automation and investigation.
  • Understanding of network protocols, firewall configurations, and endpoint security solutions.

Join WhatsApp Channel