Job Openings
Lead - Platform Engineer
About the job Lead - Platform Engineer
Key Responsibilities
Threat-Informed Detection Engineering
- Convert Red Team and adversary simulation insights into formal detection enhancements
- Map detections to MITRE ATT&CK, define telemetry requirements, and validate log sources & enrichments (ASIM-aligned where applicable)
- Perform post-engagement gap analysis, prioritize fixes in a transparent detection backlog
- Ensure each finding results in:
o Improved/validated use case (KQL logic + entity mapping + suppression)
o Updated triage guidance and analyst notes
o Logic Apps playbook enhancement (if applicable)
o Re-testing with Red Team
Full Use Case Development & Improvement Lifecycle
- Design: data requirements, ASIM mapping, entity model, severity, rationale, ATT&CK coverage
- Build: KQL logic, enrichment (watchlists/UEBA/context), suppression thresholds, incident settings
- Test: lab data, adversarial replay, quality gates (TP/FP rates, performance)
- Deploy: CI/CD with approvals, release notes, rollback plan
- Operate: health checks, noise reduction, performance optimization
(query/runtime) - Retire: deprecate & archive with justification
- Structured improvement cycles: SOC feedback - Engineering validation - Red Team re-test - Content update.
Red Team – Engineering Collaboration
- Log all Red Team findings as use case candidates in a tracked backlog
- Partner with identity, network, cloud, and platform teams to enable telemetry and close platform gaps
- Maintain measurable outcomes: coverage uplift, detection efficacy, time-to-fix
SOAR / Logic Apps Playbook Enhancement
- Lead improvements to Logic Apps playbooks and automation patterns
(enrichment, notifications, ticketing, containment orchestration) - Apply attacker-driven learnings to harden playbooks (anti-bypass steps, validation & guardrails)
- Ensure robust error handling, retry policies, timeout controls, connection health monitoring, and Managed Identities/Key Vault hygiene
- Instrument playbooks with telemetry (success/failure, latency, step metrics)
Platform Ownership (Microsoft Sentinel)
- Own connectors, DCR/AMA, ASIM parsers, cost controls (table selection,
Basic/Analytics tiers, data caps), Watchlists, Workbooks, Content Hub solutions - Govern RBAC, CI/CD promotion gates, API permissions & service principals
- Drive data quality & health: missing sources, parsing failures, schema drift, time skew, volume anomalies
- Optimize storage/retention/archival, tune query performance and workspace costs
Governance, Reporting & Compliance
- Maintain full auditability: change records, approvals, test evidence, version history
- Produce coverage reports (by ATT&CK, asset class, control family) and Red Team uplift metrics
- Enforce segregation of duties and least privilege for SIEM operations
Person Specifications
- 06 – 10 years in SIEM engineering/detection engineering (Sentinel preferred)
- Deep hands-on with Microsoft Sentinel, KQL, ASIM, Logic Apps, Content Hub, Watchlists, Workbooks
- Proven experience partnering with Red Team/Pentesters and running Purple Team validations
- Ability to translate attacker TTPs into telemetry + high-fidelity detections
- Skilled with CI/CD for SIEM (Git, Azure DevOps), Detection-as-Code, and environment promotion
- Strong grasp of cloud identity & auth (Entra ID/OAuth/SAML/Kerberos), network protocols, and Windows/Linux telemetry
- Scripting for automation (PowerShell/Python), API integrations, and data normalization
Nice To Have
- Experience with M365 Defender and its bi-directional integrations with Sentinel
- Familiarity with Fusion/UEBA, ML anomalies, and custom parsers (KQL functions)
- Cost engineering for Sentinel (table strategy, Basic vs Analytics, archive/search)