Offer summary
Qualifications:
3+ years hands-on experience in Azure Sentinel or other SIEM tools, Experience with IDS and Network Security roles, Knowledge of Mitre framework and EDR platforms, Experience in threat analysis and incident response, Proficient in report generation and event monitoring.
Key responsabilities:
- Review and qualify escalated SIEM incidents
- Provide monthly trend and security analysis reports
- Perform log analysis and develop recommendations
- Collaborate across teams for incident resolution
- Advocate for protection strategies from lessons learned