This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Truveta is the world’s first health provider led data platform with a vision of Saving Lives with Data. Our mission is to enable researchers to find cures faster, empower every clinician to be an expert, and help families make the most informed decisions about their care. Achieving Truveta’ s ambitious vision requires an incredible team of talented and inspired people with a special combination of health, software and big data experience who share our company values. Success in the healthcare industry is predicated on a foundation of trust. We demonstrate our trustworthiness as stewards of health data through three foundational pillars: security, privacy, and compliance. The successful candidate will design, implement and support solutions that support the company’s Digital Workplace strategy. They will work on leading edge technologies that help modernize endpoint management by leveraging the cloud to quickly deliver end-user improvements.
Job Responsibility:
Incident Response: Handle investigation and response to security incidents across endpoints, identities, email, cloud workloads, and SaaS applications
Act as a senior escalation point for SOC analysts during complex or ambiguous security events
Participate in on-call rotations and provide senior-level escalation support when needed
Lead or contribute to post-incident reviews (RCA, postmortems) and track remediation actions to completion
Ensure incidents are accurately documented for audit, compliance, and operational learning
Maintain and improve incident response runbooks, playbooks, and escalation procedures
Support incident readiness activities, including tabletop exercises and response drills
Detection Engineering & Automation: Develop, tune, and maintain Microsoft Sentinel analytics rules to improve detection quality and reduce false positives
Design and optimize KQL queries for investigations, threat hunting, and detection engineering
Integrate and maintain log sources and data connectors in Microsoft Sentinel, ensuring data quality and proper normalization
Build and maintain SOAR automation and playbooks (Logic Apps) for alert enrichment, triage, and response
Proactive Security & Posture: Perform proactive threat hunting across Microsoft Sentinel and Defender data to identify emerging or stealthy threats
Monitor and continuously improve detection coverage and security posture (e.g., Secure Score, exposure signals)
SOC Maturity & Collaboration: Track and report on SOC and incident metrics such as MTTD, MTTA, MTTR, alert volume, and detection effectiveness
Partner with engineering and infrastructure teams to drive long-term remediation and risk reduction
Contribute to the continuous improvement of SOC tooling, automation, and operational maturity
Help define and improve SOC processes, workflows, and standards
Mentorship & Continuous Learning: Mentor and guide SOC analysts and junior engineers through investigations and response activities
Stay current on threat intelligence, attacker techniques (MITRE ATT&CK), and the Microsoft security roadmap
Requirements:
Bachelor’s degree in Cyber Security, Computer Science, Information Security, Information Systems, or a related field, or equivalent practical experience
5+ years of experience in Security Operations (SOC), Incident Response, or Detection & Response role, with demonstrated ownership of complex security incidents
Hands-on experience with Microsoft Sentinel (SIEM) and Microsoft Defender XDR (Defender for Endpoint, Identity, Office 365, Cloud Apps)
Proficiency in KQL (Kusto Query Language) for investigations, threat hunting, and detection engineering
Experience designing, tuning, and maintaining SIEM detections and SOAR automation, including alert triage and response workflows
Solid understanding of Azure cloud architecture, core services, and native security controls
Familiarity with Azure Entra ID, identity security concepts, RBAC, and IAM-related threats
Experience with handing high-severity security incidents, including cross-team coordination and stakeholder communication
Familiarity with MITRE ATT&CK, threat actor techniques, and modern attack methodologies across cloud, identity, and endpoint environments
Experience supporting on-call rotations and working in a 24/7 or follow-the-sun SOC environment
Strong written and verbal communication skills, with the ability to explain technical issues to both technical and non-technical audiences
Ability to mentor junior analysts and contribute to the continuous improvement of SOC processes and tooling
Relevant certifications such as Microsoft Security Operations Analyst Associate, Azure Security Engineer Associate, SC-200, SC-100, CySA+, GCIH, GCIA, CISSP, or similar are strongly preferred
What we offer:
Interesting and meaningful work for every career stage
Great benefits package
Comprehensive benefits with strong medical, dental and vision insurance plans
401K plan
Professional development & training opportunities for continuous learning
Work/life autonomy via flexible work hours and flexible paid time off