Cyderes
Cyderes24d ago

Security Engineer II, Managed Microsoft Sentinel

BangaloreFull-Timemid
EngineeringSecurityOtherSecurity Engineer
0 views0 saves0 applied

Quick Summary

Overview

We help the world Be Everyday Ready™ Today’s threatscape is relentless. So are we. At Cyderes, we specialize in building practical IAM, exposure management, and risk programs,

Technical Tools
EngineeringSecurityOtherSecurity Engineer
We help the world Be Everyday Ready
 
Today’s threatscape is relentless. So are we. At Cyderes, we specialize in building practical IAM, exposure management, and risk programs, and stopping active threats fast with MDR that works with your existing security tools — all augmented by AI and driven by seasoned operators. Our tireless global team is laser-focused on cybersecurity, arming organizations with the people, platforms, and perspectives they need to conquer whatever tomorrow throws their way.

About the Role

~1 min read
  • Support intake process including coverage for Eastern Standard Time business hours as required
  • Administer and maintain Microsoft Sentinel and Defender XDR environments across managed clients
  • Perform health monitoring of:
    • Log ingestion pipelines
    • Data connector status
    • Automation playbooks
    • Analytics rule performance
    • Monitor ingestion volumes and support cost optimization initiatives
    • Assist in tenant standardization across multi-client MSSP environments
  • Onboard new data sources into Microsoft Sentinel following established SOPs:
    • Validate connectivity
    • Confirm correct parsing and schema normalization
    • Ensure events are visible and queryable in Log Analytics
    • Integrate Microsoft Defender data sources:
      • Defender for Endpoint
      • Defender for Identity
      • Defender for Office 365
      • Defender for Cloud Apps
      • Validate data integrity and entity mapping
      • Troubleshoot ingestion or connector issues across Azure and third-party integrations
  • Develop and maintain analytics rules (Scheduled, NRT, Fusion)
  • Create and tune detection logic using KQL
  • Reduce false positives through structured tuning and rule refinement
  • Map detections to MITRE ATT&CK framework
  • Improve alert fidelity and correlation between Defender XDR and Sentinel
  • Maintain dashboards, workbooks, and reporting artifacts
  • Assist in building reusable hunting and detection libraries
  • Monitor Sentinel and Defender XDR alerts
  • Perform Tier 2 triage and investigation of escalated alerts
  • Provide clear documentation and escalation to MDR/SOC teams
  • Support root cause investigations for platform or telemetry issues
  • Assist with containment automation where applicable
  • Develop and maintain Azure Logic App playbooks
  • Automate response actions such as:
    • Device isolation
    • User disablement
    • IP blocking
    • Ticket creation
    • Follow change management processes for configuration updates
    • Test changes in lower environments when applicable
  • Contribute to:
    • Runbooks
    • Standard operating procedures
    • Onboarding checklists
    • Detection documentation
    • Document false positives and data quality issues
    • Provide tuning feedback to senior engineers and architecture teams
    • Stay current on Microsoft security roadmap changes
    • Participate in internal training and knowledge-sharing sessions
  • Diploma or Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or related field (or equivalent experience)
  • 3–5 years of experience in IT security, SOC, or security engineering roles
  • Minimum 2 years hands-on experience with Microsoft Sentinel
  • Experience with Microsoft Defender XDR suite
  • Experience in MSSP or customer-facing environments preferred
  • Exposure to multi-tenant environments (Azure Lighthouse preferred)
  • Strong working knowledge of:
    • Microsoft Sentinel
    • Microsoft Defender XDR
    • Azure Log Analytics
    • Proficiency in KQL
    • Understanding of:
      • Windows & Linux logs
      • Azure AD / Entra ID
      • Networking fundamentals (TCP/IP, ports, firewalls, proxies)
      • Authentication & authorization models
      • Experience with:
        • Azure Logic Apps
        • REST APIs
        • PowerShell or Python scripting
        • Understanding of MITRE ATT&CK framework
        • Familiarity with MDR operational workflows

Nice to Have

~1 min read
  • SC-200 (Microsoft Security Operations Analyst)
  • AZ-500 (Azure Security Engineer)
  • SC-100 (Cybersecurity Architect)
  • Security+
  • Relevant Microsoft Defender certifications
  • Strong analytical and problem-solving skills
  • Clear written and verbal communication
  • Ability to document investigations and platform changes thoroughly
  • Customer-focused mindset
  • Ability to balance operational and engineering responsibilities

Location & Eligibility

Where is the job
Location terms not specified
Who can apply
Same as job location
Listed under
Worldwide

Listing Details

Posted
April 3, 2026
First seen
April 3, 2026
Last seen
April 27, 2026

Posting Health

Days active
23
Repost count
0
Trust Level
33%
Scored at
April 27, 2026

Signal breakdown

freshnesssource trustcontent trustemployer trust
Cyderes
Cyderes
lever

Cyderes is a leading global provider specializing in full life-cycle cybersecurity services, helping organizations manage risk and respond to threats effectively.

Employees
350
Founded
2017
View company profile
Newsletter

Stay ahead of the market

Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.

A
B
C
D
Join 12,000+ marketers

No spam. Unsubscribe at any time.

CyderesSecurity Engineer II, Managed Microsoft Sentinel