Job Type
Work Type
Location
Experience
Demonstrated background developing analytics rules, incidents, playbooks, notebooks, workbooks, threat hunting and developing KQL queries for data normalization and parsing capabilities within Log Analytics' data ingestion pipeline. Perform log event analysis by correlating data from various log sources for threat detection. Highly proficient with Azure Sentinel and Azure Log Analytics; focusing primarily on SIEM (security information and event manager) and SOAR(security orchestration automated response) use case development and data collection utilizing the Azure Sentinel and Azure Log Analytics toolsets.