Job Description
- 3 - 6 mth contract
- Utilise your MS Defender & Sentinel expertise
- Work within an established SOC group
Our customer seeks a Senior SOC Analyst / Threat Detection Analyst to help them deal with and triage Cyber Incidents.
Ideally you will already have had a minimum of "Level 2" experience (ideally Level 3) or may even be the "Lead SOC Expert".
Skill-sets and experience we seek includes:
This is an hourly rate contract (likely to be between 3 / 6 mths). For more info drop Nathan a note - nathan.masters@taska.co.nz or apply online
Ideally you will already have had a minimum of "Level 2" experience (ideally Level 3) or may even be the "Lead SOC Expert".
Skill-sets and experience we seek includes:
- Strong MS Sentinel expertise (been using it for a number of years)
- Microsoft Sentinel Logic App exposure
- Strong MS Defender (know the whole Defender suite and have configured aspects of entire suite)
- Strong knowledge of cyber security practices in a hybrid environment of on-premise, SaaS, and cloud services, preferably in an operation and/or incident management role.
- Ability to identify and mitigate network vulnerabilities and explain how to avoid them
- Experience with both technical and operational support areas covering a broad range of security technologies, such as SIEM, firewalls, networking, system administration and scripting.
This is an hourly rate contract (likely to be between 3 / 6 mths). For more info drop Nathan a note - nathan.masters@taska.co.nz or apply online