Security Engineer SIEM & Threat Detection
Experience Required: Mid-Level (8–10 Years)
Job Summary
This profile defines the technical skills and experience required for a Security Engineer specializing in Security Information and Event Management (SIEM), Security Orchestration Automation and Response (SOAR), and threat detection. The role demands hands-on engineering depth across the Microsoft security stack, with particular strength in Microsoft Sentinel, Defender XDR, and incident response automation. The candidate must be capable of both deployment and ongoing operations in a complex enterprise environment.
Experience Requirements
- 8–10 years total experience in cybersecurity or cloud infrastructure security
- Minimum 3 years of hands-on experience with the Microsoft security stack in production enterprise environments
- Demonstrated experience across both deployment (greenfield/brownfield) and steady‑state operations
- Experience managing environments with 500+ endpoints
- Exposure to regulated industries (healthcare, financial services, or equivalent) preferred
SIEM — Microsoft Sentinel
- 3+ years of Microsoft Sentinel deployment and operations experience
- Proficient in designing and deploying Log Analytics Workspaces and integrating data connectors (M365, Defender, Azure Activity, custom sources)
- Ability to configure and tune analytics rules, custom alert thresholds, and suppression logic
- Experience building and maintaining Sentinel workbooks for compliance and operational reporting
- Hands‑on experience with cross‑workspace queries and multi‑tenant Sentinel architectures (preferred)
KQL — Kusto Query Language
- Advanced KQL proficiency (joins, let statements, time‑series analysis, summarise, render)
- Ability to independently author complex threat‑hunting queries without templates
- Experience creating parameterized workbooks and custom dashboards using KQL
- Performance optimization of high‑cardinality queries across large data volumes
SOAR — Playbook & Automation Engineering
- Experience designing and building production‑grade SOAR playbooks using Azure Logic Apps
- Ability to author, test, and document end‑to‑end automated incident response workflows
- Experience integrating Sentinel playbooks with external systems (ticketing, notification, identity) via Logic App connectors
- Familiarity with Azure Automation Runbooks and PowerShell‑based remediation scripts
- Ability to conduct and document playbook testing, including failure‑mode analysis
Defender XDR Suite
- Defender for Endpoint P2: Large‑scale deployment (500+ devices), onboarding via Intune, Group Policy, or MDE scripts; policy management
- Defender Vulnerability Management (MDVM): Dashboard configuration, CVE prioritization, remediation workflow ownership
- Defender for Office 365 Plan 2: Safe Attachments, Safe Links, anti‑phishing policy configuration, attack simulation training administration
- Microsoft Defender for Cloud Apps (MCAS): Cloud Discovery configuration, app risk scoring, anomaly‑detection policy setup
- Familiarity with the Defender XDR unified portal, including incident queue management, alert correlation, and advanced hunting
Cloud Security Posture — Defender for Cloud
- Deployment and management of Defender for Cloud (CSPM) across Azure subscriptions
- Configuration of regulatory compliance dashboards (HIPAA, HITRUST, SOC 2)
- Ability to interpret Secure Score recommendations and drive remediation initiatives
Incident Response
- Hands‑on experience authoring or contributing to Incident Response (IR) plans
- Documented participation in incident response tabletop exercises
- Familiarity with SLA‑based IR frameworks, including detection, containment, and notification timelines
- Experience with breach documentation, post‑incident reviews, and response playbook iteration
- Awareness of HIPAA breach notification requirements (§164.410, 60‑day rule) preferred
Purview Insider Risk Management
- Experience configuring Purview Insider Risk Management (IRM) policies for data exfiltration, policy violations, and departing employee scenarios
- Ability to review and interpret IRM alerts and produce compliance or leadership‑level reports
- Understanding of IRM prerequisites, including DLP labeling and Microsoft Defender for Endpoint (MDE) integration
Compliance Framework Awareness
- Working knowledge of SOC 2 Trust Services Criteria, especially CC7.x (system monitoring, anomaly detection, incident response)
- Familiarity with HIPAA Security Rule §164.312(b) — Audit Controls
- Awareness of the HITRUST r2 framework and its alignment with HIPAA requirements
- Understanding of what constitutes valid audit evidence for control testing
Technical Skills Assessment:
HR screening reference: Use the criteria below to map candidate CV
and interview responses against minimum proficiency thresholds.
Microsoft Sentinel
- Category: SIEM
- Minimum Proficiency: Deployment + Operations
- Minimum Years: 3+
- Requirement: Required
KQL (Kusto Query Language)
- Category: SIEM
- Minimum Proficiency: Advanced
- Minimum Years: 3+
- Requirement: Required
Azure Logic Apps (SOAR)
- Category: SOAR
- Minimum Proficiency: Production playbook build
- Minimum Years: 2+
- Requirement: Required
Defender for Endpoint P2
- Category: Endpoint
- Minimum Proficiency: Enterprise deployment
- Minimum Years: 2+
- Requirement: Required
Defender Vulnerability Management
- Category: Endpoint
- Minimum Proficiency: Dashboard & remediation
- Minimum Years: 2+
- Requirement: Required
Defender for Office 365 P2
- Category: Email Security
- Minimum Proficiency: Policy configuration
- Minimum Years: 2+
- Requirement: Required
MCAS / Defender for Cloud Apps
- Category: Cloud Security
- Minimum Proficiency: Cloud Discovery + policies
- Minimum Years: 1+
- Requirement: Required
Defender for Cloud (CSPM)
- Category: Cloud Security
- Minimum Proficiency: CSPM deployment
- Minimum Years: 1+
- Requirement: Highly Preferred
Purview Insider Risk Management
- Category: Compliance
- Minimum Proficiency: Policy configuration
- Minimum Years: 1+
- Requirement: Highly Preferred
Azure Automation / PowerShell
- Category: Automation
- Minimum Proficiency: Runbook authoring
- Minimum Years: 1+
- Requirement: Preferred
Incident Response Planning
- Category: IR
- Minimum Proficiency: Authored or co‑authored
- Minimum Years: 2+
- Requirement: Required
Table top Exercise Facilitation
- Category: IR
- Minimum Proficiency: Participated / facilitated
- Minimum Years: 1+
- Requirement: Preferred
SOC 2 CC7.x Controls
- Category: Compliance
- Minimum Proficiency: Working knowledge
- Requirement: Highly Preferred
HIPAA §164.312(b)
- Category: Compliance
- Minimum Proficiency: Awareness
- Requirement: Preferred
HITRUST r2 Framework
- Category: Compliance
- Minimum Proficiency: Awareness
- Requirement: Nice to Have
Multi‑tenant Microsoft Sentinel
- Category: SIEM
- Minimum Proficiency: Architecture awareness
- Requirement: Nice to Have
Certifications :
SC‑200: Security Operations Analyst Associate
- Issuing Body: Microsoft
- Requirement: Required
AZ‑500: Azure Security Engineer Associate
- Issuing Body: Microsoft
- Requirement: Highly Preferred
SC‑100: Cybersecurity Architect Expert
- Issuing Body: Microsoft
- Requirement: Nice to Have
Note: SC‑200 is a hard requirement. Candidates without it must demonstrate an active
study commitment and a credible path to certification within 90 days of joining.
Non-Technical Requirements :
Communication & Documentation
- Ability to produce clear, structured technical documentation, including alert rules, playbook runbooks, incident response plans, and evidence reports.
- Comfortable presenting security metrics and security maturity status to non‑technical stakeholders.
- Able to translate SOC alerts and security incidents into plain‑language briefings for leadership.
Evidence & Audit Mindset
- Understands that in compliance‑driven environments, every control must be evidenced (screenshots, exports, sign‑off records).
- Experience producing or contributing to evidence packages for external auditors or assessors.
- Systematic approach to naming, organizing, and retaining compliance artefacts.
Autonomy & Engineering Discipline
- Capable of independently owning a technical domain with minimal supervision.
- Strong diagnostic and troubleshooting skills, with the ability to isolate root causes in complex multi‑layer environments.
- Applies change management discipline by testing in non‑production environments, documenting changes, and seeking approval before production deployment.
Submit the application on:
Application Form
Interested to work with us? Send us your application and we will reach out to you, if you candidature fits any of our open positions.