Data Security Administrator at Netshrinks LLC
Phoenix, AZ 85018, USA -
Full Time


Start Date

Immediate

Expiry Date

07 Nov, 25

Salary

83496.0

Posted On

08 Aug, 25

Experience

3 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Sentinel, Log Analysis, Conditional Access, Data Security, Cloud, Incident Response, Dlp

Industry

Information Technology/IT

Description

2. CONDITIONAL ACCESS & IDENTITY SECURITY

  • Perform regular Conditional Access policy reviews to enforce secure, risk-based access.
  • Monitor and enhance MFA enforcement, privileged identity usage, and user risk events.
  • Collaborate to align with Zero Trust and identity governance best practices.

QUALIFICATIONS REQUIRED:

  • 3+ years in security administration, SIEM/SOAR operations, and incident response.
  • Hands-on experience with Microsoft Purview, Sentinel, Defender for Cloud, DLP, and SOAR automation (Logic Apps/Playbooks).
  • Knowledge of Conditional Access, DSPM, and AI/cloud data security.
  • Experience with threat detection, log analysis, and PowerShell/KQL scripting.

How To Apply:

Incase you would like to apply to this job directly from the source, please click here

Responsibilities

ABOUT THE ROLE

We are seeking a skilled Security Administrator to join our security operations team. This role focuses on building and managing SIEM/SOAR platforms, Microsoft Purview, Microsoft Defender for Cloud, Conditional Access, Data Loss Prevention (DLP), and Data Security Posture Management (DSPM) for AI and cloud environments.
You will be responsible for threat detection, data security governance, incident response, and proactive risk reduction to protect our enterprise environment and sensitive data across hybrid and multi-cloud workloads.

KEY RESPONSIBILITIES1. SIEM/SOAR & THREAT MANAGEMENT

  • Administer and optimize Microsoft Sentinel (SIEM), Purview, and SOAR automation workflows.
  • Build and maintain analytic rules, playbooks, and threat detection use cases.
  • Investigate and respond to security incidents, perform root cause analysis, and coordinate remediation.
  • Integrate threat intelligence feeds and Microsoft Defender for Cloud alerts to enhance event correlation across cloud, container, and endpoint environments.
Loading...