What are the responsibilities and job description for the Azure Data Security Architect position at Delta System & Software Inc.?
Job Details
Hi,
Delta is emerging as one of the fastest growing IT Staffing and professional services company specializing in SAP, Guidewire, Cloud, SRE, data and applications development. Headquartered in Texas, we are a global company with offices in Canada, India, Europe, Middle East, Australia. We help clients transform through business and technology consulting, digital solutions, applications development, maintenance and support services. Visit to learn more.
Delta is an equal opportunity employer and considers all applicants without regarding to race, color, religion, citizenship, national origin, ancestry, age, sex, sexual orientation, gender identity, or any other characteristic protected by law. We are committed to creating a diverse and inclusive environment for all employees.
We have below urgent position from one of the direct client. Please go through the job description and let me know your interest. Please also share your updated resume and convenient time to reach you for a telephonic conversation.
Role : Azure Data Security Architect
Location : Princeton NJ Onsite
Long Term
Must have experience in Sentinel - Security Information and Event Management (SIEM)
Microsoft Sentinel is a cloud-native Security Information and Event Management (SIEM) and Security Orchestration Automated Response (SOAR) solution provided by Microsoft. It's used to:
- Collect security data from across the entire enterprise - including users, devices, applications, and infrastructure - both on-premises and in the cloud (Azure, AWS, etc.)
- Detect threats and suspicious activity using AI and built-in analytics
- Investigate security incidents with powerful tools and visualizations
- Respond to incidents quickly using automated workflows
Key Skills to Look For:
1. Microsoft Sentinel Expertise:
Experience setting up and configuring Sentinel workspaces
Creating and managing analytics rules and playbooks
Building custom detections and alerts
2. SIEM Experience:
Prior experience with any SIEM tools (Splunk, ArcSight, QRadar, etc.)
Understanding of log aggregation, correlation, and incident response
3. Kusto Query Language (KQL):
Ability to write queries in KQL for hunting, analysis, and dashboards
4. Security Knowledge:
Familiarity with cybersecurity concepts (threat hunting, malware analysis, MITRE ATT&CK framework, etc.)
Understanding of compliance and security frameworks (NIST, ISO 27001, etc.)
5. Azure Ecosystem:
Experience with other Azure services (Log Analytics, Azure AD, Defender for Cloud, etc.)
Knowledge of Azure Resource Manager (ARM) templates or Bicep for deployments
6. Automation & SOAR:
Experience building playbooks using Azure Logic Apps for automated incident response
7. Certifications (Nice to Have):
Microsoft Certified: Azure Security Engineer Associate
Microsoft Certified: Security Operations Analyst Associate
CompTIA Security , CISSP, etc.
Regards,
Ashutosh Kumar