We are seeking a highly skilled Security Operations Engineer with a strong focus on the Microsoft Security Suite (Defender, Sentinel, and other Microsoft security products). This role involves close collaboration with the development team to configure, manage, and optimize Microsoft Sentinel and other security products, while continuously improving security operations practices. The ideal candidate should have a solid understanding of incident response and threat hunting, enabling them to quickly detect, analyze, and mitigate security incidents.
Key Responsibilities:
Configuration and Optimization: Work directly with the development team to configure and fine-tune Microsoft Sentinel and Defender solutions, ensuring seamless integration across the organization’s environment. Use Case Development and Customization: Edit, create, and optimize use cases within Sentinel to detect a wide range of security threats. Customize and adapt out-of-the-box Sentinel queries and detections to align with the organization's specific security needs. Security Operations: Monitor, analyze, and respond to security alerts within the Microsoft security ecosystem, ensuring incidents are efficiently investigated, escalated, and remediated. Incident Response: Take a hands-on role in responding to and managing security incidents, including conducting thorough investigations, triaging alerts, and executing containment and remediation strategies. Threat Hunting: Proactively identify potential security threats and vulnerabilities through continuous monitoring, threat intelligence, and advanced analytics. Develop and refine hunting queries to enhance detection capabilities. Upgrades and Patching: Regularly update and upgrade the Microsoft security products, ensuring the environment is patched, secure, and running the latest versions of relevant security features. Collaboration with Development Team: Partner closely with the development team to ensure security solutions align with system requirements, providing expertise in security best practices. Documentation & Reporting: Maintain detailed documentation of security configurations, incident responses, and threat-hunting activities. Produce actionable reports for stakeholders regarding security posture and incident management.
Key Requirements:
Experience: Minimum of 3 years of experience in Security Operations or Security Engineering, with a focus on Microsoft Defender and Sentinel. Incident Response Knowledge: Strong understanding of incident response principles and processes, with hands-on experience in responding to security breaches, including containment, eradication, and recovery. Threat Hunting Expertise: Solid experience in threat hunting within an enterprise environment, including creating custom queries and leveraging threat intelligence to proactively find security issues. Technical Skills: Proficient in Microsoft Defender for Endpoint, Defender for Identity, and Microsoft Sentinel. Experience with Azure Security Center, Azure Sentinel, and Security Information and Event Management (SIEM) platforms. Familiarity with scripting (e.g., PowerShell, Python) for automation and workflow improvements. Hybrid Working: Must be based in or around Utrecht, with the ability to work in a hybrid setup (partly remote, partly onsite). Strong Communication Skills: Ability to communicate technical concepts effectively to both technical and non-technical teams.
Preferred Qualifications:
Certifications: Relevant certifications such as Microsoft Certified: Security Operations Analyst Associate, Certified Incident Handler (GCIH), or Certified Ethical Hacker (CEH) are a plus. SIEM Experience: Experience in SIEM and familiarity with threat detection frameworks and attack methodologies (e.g., MITRE ATT&CK) is highly desirable. Collaboration Tools: Experience with collaboration and project management tools, such as Jira or Confluence, is beneficial.a