Siem Security Engineer

Merck Merck · Pharma · Bucuresti, Romania

This role focuses on managing and optimizing Microsoft Sentinel for security monitoring, log ingestion, data engineering, and detection engineering within an enterprise Azure environment. It involves working with Azure Data Explorer and Cribl to ensure reliable, normalized, and actionable security telemetry.

What you'd actually do

  1. Design, deploy, administer, and continuously improve Microsoft Sentinel in a multi‑subscription, enterprise Azure environment
  2. Develop, tune, and maintain analytics rules, scheduled queries, NRT detections, workbooks, and dashboards using KQL
  3. Optimize alert quality by reducing false positives and improving signal‑to‑noise ratio
  4. Implement detections aligned with MITRE ATT&CK and threat intelligence use cases
  5. Support SOC investigations by providing advanced log analysis and hunting queries

Skills

Required

  • Microsoft Sentinel
  • Kusto Query Language (KQL)
  • Cribl
  • Azure Data Explorer (ADX)
  • security logging and telemetry
  • security fundamentals
  • SOC operations
  • incident response
  • ITIL processes
  • ServiceNow
  • Jira
  • troubleshooting skills

Nice to have

  • Sentinel SOAR (Logic Apps)
  • automated response workflows
  • advanced hunting
  • detection engineering
  • MITRE ATT&CK
  • SIEM ingestion costs
  • data retention strategies
  • Python
  • PowerShell
  • cloud-native security architectures
  • zero-trust concepts
  • regulated enterprise environments
  • Microsoft Sentinel certifications
  • Azure Security Engineer certifications
  • Cribl certifications
  • Splunk certifications
  • GIAC certifications

What the JD emphasized

  • Microsoft Sentinel
  • Cribl
  • Azure Data Explorer (ADX)
  • Kusto Query Language (KQL)