This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Focus on hands-on threat detection, investigation, and incident response while strengthening the overall security posture of the organization. This role emphasizes active monitoring and response using the Microsoft security stack, along with proactive efforts across vulnerability management, infrastructure hardening, and identity and access controls.
Job Responsibility:
Administer and optimize Microsoft Defender for Endpoint, including alert triage, investigation, and response actions
Monitor and manage security events within a SIEM platform such as Microsoft Sentinel, reviewing alerts and escalating incidents as needed
Investigate suspicious activity, endpoint alerts, and potential security incidents across the environment
Participate in incident response activities, including containment, eradication, and documentation
Perform enterprise vulnerability scanning and coordinate remediation with Infrastructure and Cloud teams
Validate and support secure configuration baselines for servers, endpoints, and cloud resources
Support implementation and maintenance of identity and access controls, including conditional access and device compliance policies
Develop and maintain incident response procedures and technical runbooks
Partner with Infrastructure and End User Compute teams to improve patching, hardening, and device security standards
Contribute to regulatory audits and cybersecurity assessments by providing technical documentation and evidence
Stay current on emerging threats, vulnerabilities, and security technologies
Requirements:
5+ years of experience in cybersecurity, security operations, or security engineering
Hands-on experience with Microsoft Defender for Endpoint or similar endpoint detection and response tools
Experience working with SIEM platforms such as Microsoft Sentinel, Splunk, or QRadar
Strong background in security investigations and incident response
Experience with scripting or automation using tools such as PowerShell, Python, or KQL
Working knowledge of Azure or other cloud platforms
Bachelor’s degree or equivalent professional experience
One or more relevant certifications such as Security+, SC-200, CySA+, or equivalent experience
Ability to operate effectively in a fast-paced, evolving environment with multiple priorities
Strong analytical, problem-solving, and documentation skills