We are seeking a Cloud Security Analyst (IC2) to strengthen cloud security monitoring, detection engineering, and posture management across Azure environments. This position involves developing and optimizing Sentinel analytics rules, ingesting hybrid and on-premises logs, and managing Defender for Cloud operations. The analyst will partner with SOC, Cloud CoE, Infrastructure, and DevOps teams to improve Secure Score, reduce vulnerabilities, and operationalize actionable detections aligned to MITRE ATT&CK.
Role Summary
- Develop, test, deploy, and fine‑tune Microsoft Sentinel analytics rules (scheduled/NRT), including entity mapping, incident grouping, and alert thresholds to minimize false positives and improve signal quality.
- Create and maintain KQL queries for detection engineering, threat hunting, and operational dashboards/workbooks; document detection logic, assumptions, and expected outcomes.
- Integrate and onboard data sources into Microsoft Sentinel, including Azure-native logs (Activity, Diagnostics, Azure resource logs, Entra ID/Azure AD logs, Defender alerts) and onprem/hybrid sources (Syslog/CEF/Windows events) using modern ingestion patterns.
- Perform data ingestion troubleshooting (missing data, parsing issues, normalization), validate data quality, and ensure appropriate retention/coverage for security investigations and audit needs.
- Operate Microsoft Defender for Cloud for posture management: review recommendations, prioritize remediation, track Secure Score improvement, and coordinate fixes with resource owners.
- Support vulnerability reduction initiatives (SQL/VM/container findings), validate remediation, and report progress with clear metrics and evidence.
- Conduct security investigations and triage cloud-related alerts/incidents; collect artifacts, validate user/activity context, and collaborate with SOC/IRT on containment, recovery, and lessons learned.
- Contribute to container security monitoring (AKS/ACR) by supporting baseline hardening, vulnerability assessment workflows, and runtime alert review in partnership with platform teams.
- Maintain SOPs/runbooks for Sentinel and Defender for Cloud operations (rule lifecycle, tuning, connector onboarding, investigation playbooks).
- Assist with periodic control checks and evidence preparation for audits (cloud governance, logging, monitoring, access controls).
- Align Sentinel detections with MITRE ATT&CK mapping and maintain documentation for auditability and knowledge transfer.
- Collaborate with infrastructure teams to ensure EDR coverage across Azure VMs and support incident investigations with endpoint telemetry.
- Integrate critical data sources (for example, API marketplace Front Door and Azure WAF logs) into Sentinel and transition monitoring ownership to SOC with SOPs.
- Enable Microsoft Defender Vulnerability Assessment for Azure SQL servers and expand coverage across all subscriptions.
- Drive measurable reduction in Azure SQL vulnerabilities .