FreshRemote.Work

Sr. Security Consultant - Microsoft Sentinel

Remote, United States

Job Summary

Stratascale is seeking a seasoned Senior Security Consultant specializing in Microsoft Sentinel to join our premier cybersecurity team. The successful candidate will possess extensive expertise in the design, implementation, and management of advanced security information and event management (SIEM) solutions using Microsoft Sentinel. This role demands a strategic thinker who can lead complex projects, develop advanced analytics, and enhance the overall security posture of our clients.

About Us

As a digital and cybersecurity services company, Stratascale exists to help the Fortune 1000 transform the way they use technology to advance the business, generate revenue, and respond quickly to market demands. We call it Digital Agility.

To learn more about how we’re shaping the future of digital business and a more secure world, visit stratascale.com.

Responsibilities

Include, but not limited to:

  • Design, implement, and manage comprehensive Microsoft Sentinel solutions to enhance clients' security frameworks.
  • Set up, configure, and optimize Microsoft Sentinel environments to ensure maximum efficiency and security.
  • Develop advanced Microsoft Sentinel analytics, connectors, and rules to improve threat detection and response capabilities.
  • Lead troubleshooting and issue resolution efforts related to Microsoft Sentinel configurations.
  • Conduct KQL threat hunting and support advanced analytics to identify and mitigate potential threats proactively.
  • Collaborate with clients to develop strategic plans for incident detection and response using Microsoft Sentinel.
  • Provide expert technical support and consultancy during the deployment and integration phases of Microsoft Sentinel services.
  • Deliver advanced training sessions and workshops to Security Operations and Incident Response personnel on Microsoft Sentinel functionalities and best practices.
  • Stay updated with emerging cybersecurity trends, technologies, and regulatory requirements.
  • Produce comprehensive documentation and analytical reports for stakeholders, highlighting insights and actionable recommendations.
  • Increase the quality of current offerings while decreasing reliance on competitive technologies during incident processes.

Qualifications

  • Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related discipline.
  • Minimum of 5-7 years' of experience in cybersecurity, with at least 3 years focused on Microsoft Sentinel or similar SIEM technologies.
  • Demonstrated expertise in implementing and managing SIEM solutions in large-scale environments.
  • Strong knowledge of security frameworks and regulations such as NIST, ISO 27001, PCI-DSS, etc.

Required Skills

  • Proficient in Kusto Query Language (KQL) for threat hunting and analytics development.
  • Ability to work effectively, add value as a team member for the practice discipline.
  • Ability to train and disseminate information within an area or operation and work effectively within all levels of an organization, both internally and externally
  • Strong communication skills and ability to engage and discuss technical and non-technical concepts with a wide array of customer audience types including C-Suite, VP/Director, Architect, Engineer and Analyst resources.
  • Emotional intelligence, flexible work style, and excellent diplomatic skills across all levels of the organization
  • Attention to detail, organization, and follow up skills are critical.
  • Initiative to research and resolve problems with a positive attitude.
  • Ability to mentor and guide others.
  • Excellent problem-solving skills with the ability to think strategically.

Certifications Required

  • Relevant certifications (e.g., Microsoft Certified: Security Operations Analyst, Azure Security Engineer, or equivalent) are a plus.

Unique Requirements

  • Attend virtual customer meetings when appropriate
  • Travel to customer sites, partner sites, conferences, and Stratascale offices up to 25% annually

Additional Information

  • The estimated annual pay range for this position is $165,000 - $205,000 which includes a base salary and bonus. The compensation for this position is dependent on job-related knowledge, skills, experience, and market location and, therefore, will vary from individual to individual. Benefits may include, but are not limited to, medical, vision, dental, 401K, and flexible spending.
  • Equal Employment Opportunity – M/F/Disability/Protected Veteran Status

Compensation Structure

Base Plus Bonus

Approved Min (Total Target Comp)

USD $165,000.00/Yr.

Approved Max (Total Target Comp)

USD $205,000.00/Yr. Apply

Job Profile

Regions

North America

Countries

United States

Benefits/Perks

Dental Flexible Spending Medical Vision

Tasks
  • Collaborate on incident detection plans
  • Conduct KQL threat hunting
  • Deliver training sessions
  • Design and implement Microsoft Sentinel solutions
  • Develop analytics and rules
  • Lead troubleshooting efforts
  • Optimize Microsoft Sentinel environments
  • Produce documentation and reports
  • Provide technical support
Skills

Advanced Analytics Analytical Communication Cybersecurity Documentation Incident Response ISO 27001 Kusto Query Language (KQL) Microsoft Sentinel NIST PCI DSS Problem-solving Security frameworks SIEM Technical Support Threat Detection Training

Experience

5-7 years

Education

Bachelor's degree Computer Science Cybersecurity Information Technology

Certifications

Microsoft Certified

Timezones

America/Anchorage America/Chicago America/Denver America/Los_Angeles America/New_York Pacific/Honolulu UTC-10 UTC-5 UTC-6 UTC-7 UTC-8 UTC-9