suitable methods. QUALIFICATIONS AND SKILLS English level C1 or above Strong analytical and documentation skills Bachelor's degree or equivalent experience Microsoft Sentinel SIEM Strong scripting skills in PowerShell, KustoQueryLanguage, Python (highly advantageous) Strong understanding of encryption technologies (TLS/SSL, PKI, IPSec, AES) Microsoft 365 Security & Compliance Microsoft Defender for Endpoints Microsoft Defender for More ❯
3+ years focusedon detection engineering Proven ability to operationalise threat intelligence into actionable, high-delity detections Demonstratable experience with detection-as-code using multiple detection languages - Sigma, YAML, SPL, KQL, YARA-L, CoreTIDE. Procient with Python, Git/GitHub and developing security tooling integrations and automations Hands-on experience with Splunk Cloud, Enterprise Security, and SOAR Deep understanding of MITRE More ❯
stakeholders, and cloud architecture groups. Must-Have Skills Experience with Azure Sentinel: Deploy and manage connectivity to AWS and GitHub Debug Azure LogicApps supporting SIEM and SOAR Proficient in KQL for log analysis Expertise in Defender for Cloud: Deploy and manage Workbooks Configure Azure Policies for security posture Implement regulatory compliance templates Hands-on experience with LogicMonitor and ServiceNow integrations More ❯