Array
Remote · Full-time · Senior

About The Position

The ideal candidate will have a solid background in cybersecurity, especially in using Microsoft security tools and services. Demonstrable experience in scripting, security systems integration, rule creation, and cost optimization is essential.

Part-time position, hourly rate

We Offer:

  • People-oriented management without bureaucracy
  • The friendly climate inside the company is confirmed by the frequent comeback of previous employees
  • Full financial and legal support for private entrepreneurs
  • Free English classes with native speakers or with Ukrainian teachers (for your choice)
  • Dedicated HR

Responsibilities:

  • Implementation and Configuration of Security Solutions;
  • Add and configure data sources in Microsoft Sentinel, utilizing both Microsoft’s connector library and integrating custom data sources as required;
  • Develop, test, and deploy detection rules in Microsoft Sentinel using KQL (Kusto Query Language) to identify potential security incidents and threats;
  • Leverage scripting skills in Python or PowerShell to automate repetitive tasks and manipulate data as needed;
  • Work within a multi-tenant MDR (Managed Detection and Response) or SOC environment, collaborating with other security professionals to enhance overall security posture.

Requirements

  • A bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field. 
  • Proficient in using Microsoft Sentinel and Microsoft Log Analytics for security management and data analysis.
  • Advanced KQL (Kusto Query Language) knowledge for crafting complex queries and detection rules.
  • Experience in deploying and managing infrastructure with ARM templates or Terraform.
  • Proven track record in setting up and managing a multi-tenant MDR (Managed Detection and Response) or SOC (Security Operations Center) environment specifically using Microsoft Sentinel.
  • Demonstrable experience in adding and configuring data sources to Microsoft Sentinel, including both Microsoft’s connector library and custom data sources.
  • Experience in writing effective detection rules within Microsoft Sentinel to identify and react to security threats.
  • Skilled in using Azure Logic Apps for automating security workflows and responses.
  • Scripting experience with Python or PowerShell to automate tasks and process data.
  • Familiarity with log management tools such as Logstash or Filebeat is beneficial but optional.


Our next steps:

 ✅ Submit a CV in English — ✅ Intro call with a Recruiter — ✅ The client interview— ✅ Test task — ✅ Offer


Offices

 



CAN’T FIND YOUR JOB HERE?

We are opening new vacancies every day. Send us your CV and we’ll keep your resume on file for future references.

This website uses cookies to ensure you get the full experience. You can change this any time.