Description:
Requirements: 4 or more years of experience in Microsoft Sentinel SIEM and SOAR development. Proficiency in Kusto Query Language for advanced analytics and threat hunting. Experience in Azure Logic Apps and Azure Functions for security automation. Experience with Python and PowerShell for custom module and script development. Experience in GitHub or Azure DevOps pipelines for detection-as-code deployments. Experience with User and Entity Behavior Analytics and anomaly detection modeling. Excelle
Dec 31, 2025;
from:
dice.com