[Remote] SOC Engineer--REMOTE/ Washington, DC

🌍 Remote, USA 🎯 Full-time πŸ• Posted Recently

Job Description

Note: The job is a remote job and is open to candidates in USA. Dice is the leading career destination for tech experts at every stage of their careers. Our client, Protos IT, is seeking a SOC Engineer to focus on engineering SOC data feed solutions, implementing SOAR capabilities, and ensuring feed health through cross-team collaboration. Responsibilities β€’ Microsoft Sentinel Engineering: Maintain and optimize a Microsoft Sentinel SIEM/SOAR solution in alignment with client requirements, industry best practices, and federal compliance mandates. β€’ Data Integration: Configure and manage log/data feeds from diverse sources (e.g., Fluent Bit, Windows Events, M365, cloud services, endpoint/security platforms). β€’ Parsing & Normalization: Develop and refine log parsing rules using Regex, DCRs, and custom transformations to ensure accurate and usable data in Sentinel. β€’ SOAR Development: Engineer automation and orchestration solutions using Microsoft Logic Apps, Azure Functions, and PowerShell/Python scripts to improve SOC efficiency and incident response. β€’ Threat Detection Engineering: Build, tune, and optimize analytic rules, UEBA, dashboards, and reports to improve detection and response coverage. β€’ Collaboration: Partner with cross-functional teams (network, endpoint, cloud, IT ops) to integrate new data sources and deliver actionable SOC capabilities. β€’ Documentation & Knowledge Transfer: Develop and maintain clear documentation of SOC architecture, log source onboarding, and automation playbooks; provide training for SOC analysts on new tools and processes. β€’ Advisory & Improvement: Conduct gap analyses of existing SOC capabilities, recommend improvements, and contribute to SOC process maturity. β€’ Incident Response Support: Provide Tier 3 support and assist with complex investigations when required. Skills β€’ 2 5 years of experience in network defense, SOC engineering, or cybersecurity operations. β€’ Hands-on experience with Microsoft Sentinel, including log onboarding, rule development, and automation. β€’ Proficiency with log parsing and normalization (Regex, Fluent Bit, DCRs, KQL). β€’ Strong scripting skills in PowerShell and/or Python for automation and data handling. β€’ Experience configuring and maintaining data feeds for SOC visibility (cloud, endpoint, network, and on-prem). β€’ Familiarity with incident response concepts, threat detection engineering, and SOAR workflows. β€’ Excellent written and verbal communication skills with ability to work across technical and non-technical teams. β€’ Bachelor s degree in Computer Science, Information Security, or related field (or equivalent experience). β€’ 5+ years of progressive cybersecurity/SOC experience (engineering and operations). β€’ Knowledge of federal cybersecurity mandates (M-21-31, NIST Cybersecurity Framework, CISA Incident/Vulnerability Playbooks, BOD 22-01). β€’ Experience with Microsoft Logic Apps, Azure Functions, or other SOAR development platforms. β€’ Experience with UEBA configuration to enhance anomaly detection. β€’ Background in AI/ML frameworks for cyber analytics. β€’ Experience building SOC metrics, dashboards, and reporting for operational visibility. β€’ Familiarity with M365, Azure security tools, ServiceNow workflows, and CISA CDM tools. β€’ Relevant certifications such as CISSP, CISM, Microsoft Security Operations Analyst (SC-200), or Azure Security Engineer (AZ-500). Company Overview β€’ Welcome to Jobs via Dice, the go-to destination for discovering the tech jobs you want. It was founded in undefined, and is headquartered in , with a workforce of 0-1 employees. Its website is Apply tot his job

Ready to Apply?

Don't miss out on this amazing opportunity!

πŸš€ Apply Now

Similar Jobs

Recent Jobs

You May Also Like