Sr. Security Consultant - Microsoft Sentinel
Remote, United States
Job Summary
Stratascale is seeking a seasoned Senior Security Consultant specializing in Microsoft Sentinel to join our premier cybersecurity team. The successful candidate will possess extensive expertise in the design, implementation, and management of advanced security information and event management (SIEM) solutions using Microsoft Sentinel. This role demands a strategic thinker who can lead complex projects, develop advanced analytics, and enhance the overall security posture of our clients.
About Us
As a digital and cybersecurity services company, Stratascale exists to help the Fortune 1000 transform the way they use technology to advance the business, generate revenue, and respond quickly to market demands. We call it Digital Agility.
To learn more about how we’re shaping the future of digital business and a more secure world, visit stratascale.com.
Responsibilities
Include, but not limited to:
- Design, implement, and manage comprehensive Microsoft Sentinel solutions to enhance clients' security frameworks.
- Set up, configure, and optimize Microsoft Sentinel environments to ensure maximum efficiency and security.
- Develop advanced Microsoft Sentinel analytics, connectors, and rules to improve threat detection and response capabilities.
- Lead troubleshooting and issue resolution efforts related to Microsoft Sentinel configurations.
- Conduct KQL threat hunting and support advanced analytics to identify and mitigate potential threats proactively.
- Collaborate with clients to develop strategic plans for incident detection and response using Microsoft Sentinel.
- Provide expert technical support and consultancy during the deployment and integration phases of Microsoft Sentinel services.
- Deliver advanced training sessions and workshops to Security Operations and Incident Response personnel on Microsoft Sentinel functionalities and best practices.
- Stay updated with emerging cybersecurity trends, technologies, and regulatory requirements.
- Produce comprehensive documentation and analytical reports for stakeholders, highlighting insights and actionable recommendations.
- Increase the quality of current offerings while decreasing reliance on competitive technologies during incident processes.
Qualifications
- Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related discipline.
- Minimum of 5-7 years' of experience in cybersecurity, with at least 3 years focused on Microsoft Sentinel or similar SIEM technologies.
- Demonstrated expertise in implementing and managing SIEM solutions in large-scale environments.
- Strong knowledge of security frameworks and regulations such as NIST, ISO 27001, PCI-DSS, etc.
Required Skills
- Proficient in Kusto Query Language (KQL) for threat hunting and analytics development.
- Ability to work effectively, add value as a team member for the practice discipline.
- Ability to train and disseminate information within an area or operation and work effectively within all levels of an organization, both internally and externally
- Strong communication skills and ability to engage and discuss technical and non-technical concepts with a wide array of customer audience types including C-Suite, VP/Director, Architect, Engineer and Analyst resources.
- Emotional intelligence, flexible work style, and excellent diplomatic skills across all levels of the organization
- Attention to detail, organization, and follow up skills are critical.
- Initiative to research and resolve problems with a positive attitude.
- Ability to mentor and guide others.
- Excellent problem-solving skills with the ability to think strategically.
Certifications Required
- Relevant certifications (e.g., Microsoft Certified: Security Operations Analyst, Azure Security Engineer, or equivalent) are a plus.
Unique Requirements
- Attend virtual customer meetings when appropriate
- Travel to customer sites, partner sites, conferences, and Stratascale offices up to 25% annually
Additional Information
- The estimated annual pay range for this position is $165,000 - $205,000 which includes a base salary and bonus. The compensation for this position is dependent on job-related knowledge, skills, experience, and market location and, therefore, will vary from individual to individual. Benefits may include, but are not limited to, medical, vision, dental, 401K, and flexible spending.
- Equal Employment Opportunity – M/F/Disability/Protected Veteran Status
Compensation Structure
Base Plus BonusApproved Min (Total Target Comp)
USD $165,000.00/Yr.Approved Max (Total Target Comp)
USD $205,000.00/Yr. ApplyJob Profile
Dental Flexible Spending Medical Vision
Tasks- Collaborate on incident detection plans
- Conduct KQL threat hunting
- Deliver training sessions
- Design and implement Microsoft Sentinel solutions
- Develop analytics and rules
- Lead troubleshooting efforts
- Optimize Microsoft Sentinel environments
- Produce documentation and reports
- Provide technical support
Advanced Analytics Analytical Communication Cybersecurity Documentation Incident Response ISO 27001 Kusto Query Language (KQL) Microsoft Sentinel NIST PCI DSS Problem-solving Security frameworks SIEM Technical Support Threat Detection Training
Experience5-7 years
EducationBachelor's degree Computer Science Cybersecurity Information Technology
Certifications TimezonesAmerica/Anchorage America/Chicago America/Denver America/Los_Angeles America/New_York Pacific/Honolulu UTC-10 UTC-5 UTC-6 UTC-7 UTC-8 UTC-9