This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
We are looking for a SOC Architect who specializes in Microsoft Sentinel or other SIEM system. This person will develop the detection and automation strategy for Microsoft 365, Azure, and Defender XDR while maintaining hands-on capabilities for creating detections, KQL queries, playbooks, and integrations. This multifaceted role encompasses architecture, design, governance, implementation, and standardization, and is essential for building a SOC ready for 24/7 operations. The environment includes a mix of vendors, so this is not a purely Microsoft role. The architect will also incorporate integration logic from third-party security technologies.
Job Responsibility:
Develop and maintain advanced threat detection scenarios using open-source and vendor-based tools
Deploy, configure, and manage security technologies, including SIEM, SOAR, SaST/DaST Tools
Automate incident response and security processes using scripting and programming languages such as Python, Bash, PowerShell, and Java
Conduct threat research and hunting, leveraging frameworks like MITRE ATT&CK and MITRE Shield
Manage and maintain SOC technologies and security processes, ensuring optimal performance and continuous improvement
Utilize threat intelligence services, malware sandboxes, and forensic tools to detect and analyze malicious activity
Develop, deploy, and manage security automation workflows in SOAR platforms to streamline incident response and SOC operations
Develop and implement detection engineering lifecycle tools and methodologies
Design and implement use cases, playbooks, and automation scripts for threat detection, enrichment, and response
Assess and enhance information security processes, recommending and implementing improvements
Collaborate with cross-functional teams to improve security posture and align security strategies with business objectives
Requirements:
5+ years of experience in cybersecurity roles such as SOC engineering, incident response, security consulting, penetration testing, or red teaming
Strong knowledge of Sentinel SIEM/SOAR, endpoint security, IDS/IPS, firewalls, and network security technologies
Experience developing detection logic for SIEM platforms and responding to advanced threats
Experience with API integrations to enhance automated security workflows
Strong understanding of cloud security controls, including Azure, AWS and SaaS architectures
Knowledge of global cybersecurity standards
Cybersecurity Certifications and Microsoft certifications
Excellent written communication skills, with the ability to document findings and provide risk-based remediation recommendations
Minimum English B2 and fluent Czech language
Nice to have:
Experience with multiple SIEM (Splunk, QRadar, Elastic) or SOAR platforms.
What we offer:
Annual bonus
5 weeks of vacation
5 personal days
16 weeks vacations for new parents
mobile phone and unlimited tariff
24 000 benefit points per year to use in cafeteria