What will my role be?
In this role, you will be part of Catapult’s growing solutions delivery team in the security and infrastructure space. You will work with some great minds to design and lead cloud security solutions that meet customer needs for scalability, reliability, and performance. You will deploy Azure based solutions and technologies across a wide range of industries.
Some of your activities will include:
- Architect and design solutions to meet functional security requirements in Azure Sentinel
- Develop a deep understanding of how our customers use the Azure Sentinel platform and their use of security across Azure and M365 workloads
- Create and review Azure Sentinel architecture and solution design artifacts
- Setup and configuration of Azure Sentinel, Azure Security Center, Microsoft Defender, and M365 Security
- Perform security analyst operations within Azure Sentinel including incident response and remediation of any related damage
- Drive strategic and complex projects with many critical dependencies
- Engaging directly with customers at the CIO/CTO level, supporting executive briefings and innovation partnerships
- Building and deploying EM+S solutions to meet client needs and requirements
- Developing, Updating, and Managing PowerShell scripting for automation
- Coaching and mentoring with team members around client interaction and work delivery
What is required?
- First and foremost, you should enjoy what you do and have a passion for sharing knowledge!
- Ability to engage in customer settings and discern client business needs
- Desire to work in a team environment and ability to work across organization functional boundaries
- Ability to make decisions and manage time effectively to a delivery plan/schedule
- Demonstrated ability to organize teams toward a common objective
- Ability to take ownership of delivery assignments and work in a team to accomplish joint goals
- Security Operations Center analyst background
- Azure Sentinel Technical Skills
- Experience with Azure Monitor Log Analytics and KQL
- Data Connector Setup
- Workbooks creation and editing
- Analytics Configuration and Incident Creation
- Incident Investigation, Threat Hunting, and Remediation
- Knowledge of Entity Behavior Analytics
- Automation of Incident Remediation using the Azure Sentinel API
- Microsoft Security Technical Skills
- Azure Security Center
- Active Directory, Azure Active Directory, Azure AD Connect, ADFS, Hybrid Domain
- Experience with Azure Defender and Microsoft Defender suites
- Experience with MS Security Stack, Security Portals, & EM+S
- Working knowledge of Azure Infrastructure
- Functional knowledge of PowerShell and Azure Automation
- Bachelor’s degree in Computer Science or equivalent experience
- Ability to travel part-time.
What would set you apart?
- Experience with:
- Azure Sentinel SOC (Security Operations Center) Analyst background
- Microsoft Defender for Identity (Azure Advanced Threat Protection)
- Azure Identity Management and Conditional Access
- Multi-factor authentication (MFA) and RMS
- Microsoft Information Protection/Azure Information Protection
- Privileged Identity Management
- Experience working with ATA (Advanced Threat Analytics
- Defender for O365 Tools (Phishing & Malware) & Threat Intelligence
- O365 Data Loss Prevention
- O365 Threat Intelligence
- O365 Security Center
- Microsoft Cloud App Security
- Any of these certifications
- MS-500
- AZ-500
- MS-900
- Microsoft 365 Certified: Security Administrator
- CISSP