About The Position

This exciting opportunity is a full-time, permanent role with Pellera Technologies. Please note, candidates must have solid depth & experience utilizing the Microsoft Azure Security stack. As a Senior Engineer within the Security Architecture & Defense practice, you will act as a trusted advisor to Pellera’s client base. The Senior Engineer will provide expertise in administering technical service delivery efforts, specifically engineering of Microsoft Security solutions. The Senior Engineer will also be involved in deploying and customizing security solutions per the unique client environment requirements. We invest heavily in our team members growth with cross-technology training and certification training and, look forward to working with you!

Requirements

  • 5+ years of experience in a professional cybersecurity capacity
  • 5+ years of experience working with Microsoft security solutions especially Azure cloud
  • Strong proficiency in building, tuning, and managing Sentinel analytics rules, workbooks, hunting queries (KQL), and playbooks (Logic Apps)
  • Demonstrated experience conducting proactive threat hunting across cloud and hybrid environments using MITRE ATT&CK framework
  • Solid understanding of log ingestion pipelines, normalization schemas (like ASIM), and data connector management within Azure Sentinel
  • Deep familiarity with common attacker techniques, tactics, and procedures (TTPs), and the ability to translate them into high-fidelity detection logic
  • Strong grasp of core networking protocols and security technologies, including DNS, TCP/IP, HTTP(S), TLS, IPSec, and firewalls.

Nice To Haves

  • Microsoft security certifications are preferred
  • Industry leading certifications are a plus especially via GIAC / SANS

Responsibilities

  • Provide day to day support for enterprise level security solutions in the cloud such as Microsoft Defender for Cloud, Sentinel, Key Vault, Security Center, etc
  • Conduct proactive threat hunting across cloud and hybrid environments utilizing the MITRE ATT&CK framework
  • Create and conduct threat modeling and adversary simulations to identify detection gaps and improve SOC coverage
  • Manage and investigate alerts & incidents using EDR/XDR toolset
  • Build complex queries and custom hunting use cases
  • Conduct incident response, root cause analysis and post-incident reporting including collaboration with stakeholders and regulatory compliance team
  • Troubleshoot product issues as they arise
  • Evaluate and recommend new and emerging services and technologies

Benefits

  • Comprehensive total rewards package
  • Base salary
  • Quarterly bonus
  • Healthcare benefits
  • 401k match
  • PTO/holiday
  • Training/development
  • Promotional opportunity
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service