Your browser does not support javascript! Please enable it, otherwise web will not work for you.

Hiring - Security Analyst (Sentinel) - L2 @ Aspire Systems

Home > IT Security

 Hiring - Security Analyst (Sentinel) - L2

Job Description


SOC Analyst - Sentinel - L2

Chennai/ Bangalore/ Kochi/ Hyderabad

Responsibilities

  • Thoroughly investigate security incidents escalated by L1 analysts, going beyond initial alerts to understand the full scope and impact.
  • Analyze complex security events, logs, and incident data from various sources integrated into Azure Sentinel.
  • Determine if a security event is a genuine incident and classify its severity.
  • Utilize Azure Sentinel's investigation graph to explore entities, connections, and timelines of attacks.
  • Proactively search for undetected threats within the organization's Azure environment and connected data sources using Kusto Query Language (KQL) in Azure Sentinel.
  • Lead and coordinate incident response activities, including containment, eradication, and recovery from security incidents
  • Develop and maintain incident response playbooks within Azure Sentinel.
  • Execute automated response actions through Sentinel playbooks, such as blocking IPs, isolating compromised systems, or enriching incident data.
  • Collaborate with other security teams (e.g., L1, L3, forensic teams), IT, and business stakeholders to resolve incidents effectively.
  • Document findings, actions taken, and lessons learned to improve future incident response procedures.

Desired Skills and Qualifications

Required:

  • Deep expertise in Microsoft Sentinel: Including data connectors, analytics rules, workbooks, hunting queries, incidents, and automation (Logic Apps/Playbooks).
  • Kusto Query Language (KQL) mastery: Essential for advanced threat hunting, data analysis, and rule creation in Sentinel.
  • Understanding of Azure security services: Strong knowledge of Azure Security Center/Defender for Cloud, Azure Active Directory (now Microsoft Entra ID), Azure Monitor, Azure Networking, and other relevant Azure services.
  • SOAR (Security Orchestration, Automation, and Response): Experience in building and optimizing playbooks using Azure Logic Apps within Sentinel.
  • MITRE ATT&CK Framework: Ability to map security events and detections to MITRE ATT&CK tactics and techniques for comprehensive threat analysis.
  • Cloud Security Concepts: A solid understanding of cloud computing security principles, especially within the Azure ecosystem.

General SOC Skills

  • Strong analytical and problem-solving skills.

Excellent communication (verbal and written) and interpersonal skills.


Please share your resume to "pr*****************j@as******s.com"

Job Classification

Industry: IT Services & Consulting
Functional Area / Department: IT & Information Security
Role Category: IT Security
Role: Security Engineer / Analyst
Employement Type: Full time

Contact Details:

Company: Aspire Systems
Location(s): Hyderabad

+ View Contactajax loader


Keyskills:   Edr Azure Sentinel Sentinel SIEM Security level 2

 Fraud Alert to job seekers!

₹ Not Disclosed

Similar positions

Auditor - Electronics and IT

  • MS Certification
  • 3 - 8 years
  • Kolkata
  • 2 days ago
₹ Not Disclosed

SAP GRC Analyst

  • TEKsystems
  • 8 - 13 years
  • Noida, Gurugram
  • 2 days ago
₹ 0-40 Lacs P.A.

Senior Cybersecurity GRC Consultant

  • Client Augusta
  • 8 - 12 years
  • Bengaluru
  • 2 days ago
₹ Not Disclosed

Security Delivery Manager

  • GSPANN
  • 14 - 24 years
  • Noida, Gurugram
  • 3 days ago
₹ Not Disclosed

Aspire Systems

Aspire Systems is a global technology services firm serving as a trusted technology partner for our customers. We work with some of the world's most innovative enterprises and independent software vendors, helping them leverage technology and outsourcing in our specific areas of expertise.