Job Description

REQUIRED TECHNICAL SET

  • Strong hands-on experience with Microsoft Sentinel for SIEM and SOAR operations.
  • Expertise in log ingestion, data connectors, and analytics rule configuration.
  • Ability to create custom KQL queries for threat detection and reporting.
  • Experience in incident triage, investigation, and automated response playbooks.
  • Knowledge of integration with Microsoft Defender suite and third-party security tools.
  • Familiarity with MITRE ATT &CK framework and threat hunting techniques.
  • Proficiency in PowerShell and automation scripting for Sentinel workflows.
  • Understanding of compliance requirements and security monitoring best practices



DESIRED COMPETENCIES

  • 5+ years of experience in SIEM operations, with at least 3 years on Microsoft Sentinel. Strong knowledge of KQL (Kusto Query Language) for advanced analytics.
  • Hands-...

Apply for this Position

Ready to join Tata Consultancy Services? Click the button below to submit your application.

Submit Application