Responsible for designing, implementing, and optimizing Azure Sentinel-based security monitoring solutions. Focuses on building scalable analytics, automation, threat detections, and integrating data from enterprise systems. Requires 3-7 years of experience in security engineering/operations with strong Azure Sentinel, KQL, and Terraform skills.
Key Highlights
Key Responsibilities
Technical Skills Required
Benefits & Perks
Nice to Have
Job Description
100% Remote SOC Analyst
Must be local to Hyderabad or able to relocate upon conversion
JOB DESCRIPTION
The Security Operations Analyst role is responsible for designing, implementing, and optimizing Azure Sentinel-based security monitoring solutions across cloud and hybrid environments. This role focuses on building scalable analytics, automation, threat detections, and integrating data and developing data sources from enterprise systems—including Azure, M365, network security tools, serverless applications, containerized resources and IoMT environments where applicable. This role serves as a technical expertise for Azure Sentinel engineering, KQL query development, security automation (SOAR), threat detection improvements, log onboarding, optimizing log ingestion, creating efficiency and framework dashboards and reporting design to support a high-maturity SOC.
Interested in remote work opportunities in Cyber Security? Discover Cyber Security Remote Jobs featuring exclusive positions from top companies that offer flexible work arrangements.
Compensation: $5-10/hr Exact compensation may vary based on several factors, including skills, experience, and education.
REQUIRED SKILLS AND EXPERIENCE
• 3 to 7 years of experience in Security engineering and Security operations.
• Bachelor's degree in Computer Science, information technology, cybersecurity, or related area
Browse our curated collection of remote jobs across all categories and industries, featuring positions from top companies worldwide.
• 3 years of hands-on experience with Microsoft Sentinel, KQL and terraform.
• Strong understanding of Azure ecosystems and Azure Infrastructure/Platform service including common security services (firewalls, WAF, IDPS and RBAC).
• Experience building customer analytics rules, playbooks and workbooks.
• Understanding of MITRE ATT&CK, incident response and security monitoring best practices.
• Experience with scripting and query languages like Python, Terraform, JSON and KQL.
Similar Jobs
Explore other opportunities that match your interests
Manager of Cybersecurity
CONMED Corporation
Socium - Teams Done Differentl...