Posted 1mo ago

Sr Operation Mgmt Specialist

@ Lenovo
Singapore, Central Singapore, Singapore
OnsiteFull Time
Responsibilities:Alert triage, Investigation hunting, Playbook execution
Requirements Summary:Bachelor's degree in CS/IT/Cybersecurity; 2-3 years SIEM/security operations; certifications preferred; proficient in KQL, Microsoft Defender Stack, Azure; strong incident response and documentation skills.
Technical Tools Mentioned:Microsoft Sentinel, Kusto Query Language (KQL), Microsoft 365 Defender, Azure, Azure Logic Apps, ServiceNow
Save
Mark Applied
Hide Job
Report & Hide
Job Description
Key Responsibilities
1. Alert Triage & Continuous Monitoring
Real-Time Surveillance: Maintain high vigilance monitoring of the Microsoft Sentinel Incident queue to identify anomalies and potential security breaches.
Noise Reduction: Distinguish between benign environmental behaviour and malicious activity to reduce alert fatigue within the SOC.
Severity Assessment: Categorize and prioritize incidents based on business impact, asset criticality, and the MITRE ATT&CK framework.
2. Initial Investigation & Hunting
KQL Proficiency: Utilize Kusto Query Language (KQL) to perform deep-dive log analysis across Security Event, Sign in Logs, and Office Activity tables.
Root Cause Analysis: Conduct forensic to reconstruct timelines to validate the legitimacy of alerts.
Evidence Gathering: Correlate data across the Microsoft 365 Defender stack (Endpoint, Identity, Cloud Apps) to build a comprehensive picture of the threat actor's movements.
3. Playbook Execution & Containment
Automated Response: Execute Azure Logic App Playbooks to perform rapid containment actions, such as revoking AAD sessions or isolating compromised hosts.
Standard Operating Procedures (SOPs): Establish SOP to ensure a consistent and compliant response to known threat vectors.
Manual Remediation: Perform manual intervention when automated flows are inapplicable, ensuring the "Time to Remediate" (TTR) is minimized.
4. Incident Documentation & Reporting
Audit Trail Management: Maintain meticulous, chronological records of all investigative steps and findings within the ITSM ticketing system (e.g., ServiceNow).
Technical Summaries: Draft clear, concise post-incident summaries detailing the scope of the impact and the steps taken for resolution.
Knowledge Base Contribution: Update internal wikis or "Runbooks" with new findings to improve the team's collective response capability.
5. Advanced Escalation & Collaboration
Structured Handoffs: Identify complex or high severity true positives and escalate using the SAR (Situation, Assessment, Recommendation) communication model.
Collaborative Hunting: Assist senior analysts and security lead in threat hunting exercises by providing localized data and initial telemetry gathered during triage.
6. Health Checks & Platform Maintenance
Data Integrity Monitoring: Perform daily checks on Sentinel Data Connectors to ensure continuous log ingestion from Firewalls, Azure Activity, and O365.
Agent Health: Monitor the status of the Azure Monitor Agent (AMA) and Log Analytics workspace to identify and troubleshoot data gaps or silent connectors.
Workspace Optimization: Monitor ingestion volumes and alert the engineering team of unexpected spikes that may indicate misconfigured assets.
7. Core Technical Skills
SIEM Expertise: Minimum of 2–3 years of hands-on experience with Microsoft Sentinel, including workspace configuration, data connector management, and incident investigation.
KQL Proficiency: Advanced ability to write and optimize Kusto Query Language (KQL) for hunting, detection rules, and workbook visualization.
Microsoft 365 Defender Stack: Strong operational knowledge of the broader Defender suite (Defender for Endpoint, Identity, Office 365, and Cloud Apps).
Cloud Infrastructure: Familiarity with Azure Resources, including Virtual Machines, Storage Accounts, and Log Analytics Workspaces.
Automation: Experience triggering and troubleshooting Azure Logic Apps (Playbooks) for automated incident response.
8. Professional Experience
Onboarding & Engineering: Proven track record of onboarding diverse assets to Sentinel (Syslog, CEF, Azure Activity, and Third-party APIs).
Detection Engineering: Experience creating and tuning Analytics Rules to reduce false positives while maintaining high detection coverage.
Network Security: Understanding of TCP/IP, DNS, and HTTP/S, with the ability to interpret logs from Firewalls, Proxies, and WAFs.
9. Required Qualifications
Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related discipline.
Professional certifications such as ECIH, GCIH, CISSP or CISM are preferred.
Microsoft certifications such as SC-200: Microsoft Security Operations Analyst Associate, AZ-500: Microsoft Azure Security Technologies, SC-300: Microsoft Identity and Access Administrator Associate would be advantageous.
#LPS