Security Operations Analyst at Invaryant
Alpharetta, GA 30022, USA -
Full Time


Start Date

Immediate

Expiry Date

28 Nov, 25

Salary

0.0

Posted On

28 Aug, 25

Experience

1 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Communication Skills, Python, Tuning, Incident Response, Servicenow, Automation, Intune, Powershell, Teams, Scripting, Security Operations, Sentinel

Industry

Information Technology/IT

Description

We’re seeking a Security Operations Analyst with hands-on experience in Microsoft’s security ecosystem to help us operationalize and optimize our threat detection, incident response, and automation capabilities. You’ll work directly with the Information Security Manager to build out our SOC-lite environment, respond to threats, and design workflows that scale.
This is a high-impact role for someone who thrives in a fast-paced, lean environment and wants to shape the future of security operations from the ground up.

REQUIRED QUALIFICATIONS

  • 2+ years in a security operations or cloud security role
  • 1+ years working directly with Microsoft Sentinel and Defender suite
  • Proficiency in KQL, Logic Apps, and Microsoft 365 Security Center
  • Experience with incident response, threat hunting, and alert tuning
  • Strong understanding of MITRE ATT&CK, Zero Trust, and cloud security principles
  • Excellent written and verbal communication skills
  • Ability to work independently and collaboratively in a lean team

PREFERRED QUALIFICATIONS

  • SC-200, AZ-500, or SC-300 certification
  • Experience with Microsoft Purview, Intune, or Microsoft Compliance Center
  • Familiarity with FDA REMS systems, healthcare data workflows, or regulated environments
  • Experience integrating Sentinel with Teams, ServiceNow, or custom dashboards
  • Background in scripting (PowerShell, Python) for automation

How To Apply:

Incase you would like to apply to this job directly from the source, please click here

Responsibilities
  • Monitor and triage alerts across Microsoft Sentinel, Defender XDR, Defender for Endpoint, and Defender for Cloud
  • Build and maintain KQL queries, custom analytics rules, and SOAR playbooks using Logic Apps
  • Integrate security alerts with Microsoft Teams, ServiceNow, or other ticketing systems
  • Conduct incident investigations, root cause analysis, and containment actions
  • Collaborate with IT and DevOps to implement Zero Trust policies, RBAC, and secure configurations
  • Maintain documentation for playbooks, workflows, and escalation procedures
  • Assist in compliance efforts related to HIPAA, ISO 27001, and FDA REMS reporting systems
  • Contribute to automation and process improvement across the security lifecycle
Loading...