Inspira Enterprise Logo

Inspira Enterprise

Associate - Cybersecurity

Posted 7 Days Ago
Be an Early Applicant
In-Office or Remote
3 Locations
Mid level
In-Office or Remote
3 Locations
Mid level
The Associate - Cybersecurity role involves integrating and optimizing log sources in Microsoft Sentinel, developing monitoring solutions, and scripting automation for analysis. Responsibilities include configuring data ingestion, troubleshooting failures, and ensuring data retention compliance while developing standard operating procedures and documentation.
The summary above was generated by AI

Role Summary:

We are looking for a technically strong and process-driven SIEM Integration & Engineering Specialist with proven experience in Microsoft Sentinel to lead and execute end-to-end integration, onboarding, log parsing, transformation, and ingestion optimization activities. You will own the engineering lifecycle of log source integration, tuning, troubleshooting ingestion issues, and developing reusable automation/SOPs to support multiple enterprise and MSSP customers.

Key Responsibilities: Integration & Configuration

Create and maintain onboarding checklists for all new log sources: log size estimation, ingestion strategy, placement logic (Syslog/CommonSecurityLog/CustomLog), best onboarding method (agent, API, etc.).

Evaluate and implement native vs custom ingestion using REST APIs, syslog, CEF, Syslog-NG, and event hubs.

Manage Data Collection Rules (DCRs) for structured and unstructured data including transformations, filters, multi-line handling, and custom table mapping.

Author SOPs and “How-to” documentation for custom log normalization, transformation logic, and DCR limitations.

Recommend and justify table selection strategy (e.g., CommonSecurityLog vs. CustomLog) based on customer needs and Sentinel performance.

Ingestion Optimization & Tuning

Identify and resolve log duplication issues using correlation, diagnostic settings, and parsing analysis.

Choose between agent-based and agentless ingestion strategies; document troubleshooting methods and share reusable configurations.

Design ingestion pipelines considering performance throttling, throughput optimization, and pre-ingestion routing (like log routers, collectors, proxies).

Collaborate with customers to align ingestion design with retention policies and data costs.

Health Monitoring & Troubleshooting

Develop and maintain log rotation configurations/scripts for Linux and Windows sources, including detection and remediation of rotation issues.

Create scheduled health checks, KQL rules, and workbooks to detect connector failures, latency, heartbeat gaps, and log drop-offs.

Document common ingestion failure patterns (encoding errors, firewall/network issues, schema mismatches) with precise troubleshooting playbooks.

Maintain playbooks for character encoding issues (UTF-8, BOM) and solutions for encrypted log payloads or malformed syslog headers.

Forwarding & Collection Methods

Lead Windows Event Forwarding (WEF) implementation via GPO with enhanced configurations, filtering, and troubleshooting best practices.

Configure and tune Sysmon, Syslog-NG, Rsyslog, and Logstash for Linux and application logs; implement JDBC or file-based DB integrations.

Create reusable templates for schema mapping and log parsing pipelines for non-standard applications and tools.

Scripting & Automation

Build PowerShell/Bash scripts to automate onboarding of frequently used log sources.

Maintain or create ARM/Bicep templates for Sentinel infrastructure provisioning, including DCRs, diagnostic settings, and analytics rules.

Script or pipeline complex log transformations, parsing pipelines, and even alert tuning workflows (e.g., via Logic Apps).

Access Management & Security

Define and manage RBAC roles for Sentinel, data source connectors, and ingestion tools.

Implement Managed Identity-based ingestion for secure connections (e.g., Azure Function Apps, Logstash, REST APIs).

Audit and document access control, permission requirements, and secure token-based configurations used for custom integrations.

Must-Have Skills:

3+ years of hands-on experience with Microsoft Sentinel including DCR, KQL, and ingestion pipeline management.

Solid understanding of Syslog, CEF, Windows Event Forwarding, REST APIs, and custom data connectors.

Expertise in KQL, JSON, PowerShell/Bash, and parsing logic for complex logs.

Proven experience developing health monitoring solutions and troubleshooting data latency, connector failures, and ingestion issues.

Strong experience in SOP development, documentation, and reusable automation.

Familiarity with data transformation logic, log source prioritization, and cost management strategies in Sentinel.

Ability to work closely with security teams, cloud architects, and customer IT teams to implement best practices.

Nice-to-Have Skills:

Experience with Logstash, Syslog-NG, Rsyslog, and JDBC log integrations.

Prior work with Managed Sentinel deployments or other MSSP environments.

Familiarity with SOAR automation (Logic Apps) and integrating Sentinel with external alerting platforms.

Knowledge of Microsoft Defender XDR, Azure Security Center, or other Microsoft Security solutions.

Exposure to compliance-driven onboarding (HIPAA, PCI-DSS, ISO 27001) for regulated customers.

Soft Skills & Approach:

Process-oriented mindset with strong documentation habits.

Ability to work independently while handling multiple log source requests.

Troubleshooting-first approach with a mindset of identifying root cause, not just symptoms.

Strong communication skills for knowledge transfer and training of L1/L2 teams.

Deliverables/Artifacts the Role Will Own:

Master log source onboarding guidebook

SOP library for custom and native integrations

Collection of scripts and templates (DCR, KQL rules, health monitors, log rotation)

Workbook for ingestion health monitoring

Repository of common failure scenarios and fix playbooks

Top Skills

Arm
Bash
Bicep
Cef
Data Collection Rules (Dcrs)
Jdbc
Kql
Logstash
Microsoft Sentinel
Powershell
Rest Apis
Rsyslog
Syslog
Syslog-Ng

Similar Jobs

7 Days Ago
In-Office or Remote
3 Locations
Mid level
Mid level
Artificial Intelligence • Software • Analytics • Cybersecurity
The role involves designing and developing SOAR playbooks for incident automation using Microsoft Sentinel, enhancing SOC efficiency with custom solutions, and utilizing various scripting technologies.
Top Skills: Azure Logic AppsBashMicrosoft Security CopilotMicrosoft SentinelPower AppsPower AutomatePowershellPythonRest Apis
7 Days Ago
In-Office or Remote
2 Locations
Entry level
Entry level
Artificial Intelligence • Software • Analytics • Cybersecurity
This role involves automating incident response, integrating security tools, improving workflows, and developing custom scripts.
Top Skills: BashEdrJavaScriptPowershellPythonSIEMSoar
3 Hours Ago
Remote or Hybrid
Expert/Leader
Expert/Leader
Big Data • Food • Hardware • Machine Learning • Retail • Automation • Manufacturing
The Program Manager will oversee end-to-end program delivery in a hybrid role, managing projects and facilitating Agile ceremonies across teams. They will communicate with stakeholders and ensure adherence to governance processes.
Top Skills: AsanaJIRAO9SAP

What you need to know about the Pune Tech Scene

Once a far-out concept, AI is now a tangible force reshaping industries and economies worldwide. While its adoption will automate some roles, AI has created more jobs than it has displaced, with an expected 97 million new roles to be created in the coming years. This is especially true in cities like Pune, which is emerging as a hub for companies eager to leverage this technology to develop solutions that simplify and improve lives in sectors such as education, healthcare, finance, e-commerce and more.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account