DANASTAR Professional Services, LLC
Microsoft Sentinel Security Analyst
DANASTAR Professional Services, LLC, Washington, District of Columbia, us, 20022
Microsoft Sentinel Security Engineer
Job Type: Full-Time | Company: EastBay Systems (Formerly DANASTAR) | Location: Washington, DC
About EastBay Systems
EastBay Systems is a government IT and cybersecurity consulting firm delivering innovative and secure technology solutions to federal agencies since 2007. We specialize in Cybersecurity Program Management, GRC, SOC Support, and Secure Software Development. Our mission is to protect and enhance federal systems through advanced tools, proven frameworks, and expert teams.
Position Summary We are seeking a skilled Microsoft Sentinel Security Engineer to support the implementation, configuration, and optimization of security operations using Microsoft Sentinel. The ideal candidate will be responsible for designing advanced detection logic, integrating data sources, building analytic rules, and automating threat responses. This role plays a vital part in EastBay Systems’ mission to secure our clients’ cloud and hybrid environments against emerging cyber threats.
Key Responsibilities
Deploy, configure, and manage Microsoft Sentinel for enterprise security monitoring
Integrate Azure-native and third-party log sources and data connectors into Sentinel
Develop and fine-tune analytic rules, workbooks, dashboards, hunting queries, and custom KQL queries
Build and automate playbooks using Azure Logic Apps for security orchestration and response (SOAR)
Analyze security alerts and provide recommendations for rule improvements
Support threat hunting, incident response, and post-incident analysis within Sentinel
Collaborate with SOC analysts, engineers, and compliance teams to ensure alignment with security policies and NIST/DoD frameworks
Stay current with Microsoft security technologies, industry trends, and threat intelligence
Required Qualifications
Bachelor’s Degree in Cybersecurity, Computer Science, Information Systems, or a related field
5+ years of experience in cybersecurity, including 2+ years working with Microsoft Sentinel
Proficiency with Kusto Query Language (KQL) for writing detection and hunting queries
Hands‑on experience with Azure Monitor, Azure Log Analytics, and Microsoft Defender XDR tools
Familiarity with threat intelligence and behavioral analysis concepts
Experience designing and maintaining SIEM alert rules and integrating with ticketing systems
Excellent verbal and written communication skills
Preferred Certifications
Microsoft Certified: Security Operations Analyst Associate
Microsoft Certified: Azure Security Engineer Associate (AZ-500)
CISSP, Security+, or GIAC certifications
Familiarity with NIST 800-53, RMF, and FedRAMP environments a plus
Benefits
Mission‑driven work protecting government and critical infrastructure systems
Competitive salary and full benefits package (medical, dental, vision)
401(k)
Hybrid work options and generous PTO
Opportunities for career growth
Apply Submit your resume via email us at
Jobs@eastbaysystems.com .
#J-18808-Ljbffr
About EastBay Systems
EastBay Systems is a government IT and cybersecurity consulting firm delivering innovative and secure technology solutions to federal agencies since 2007. We specialize in Cybersecurity Program Management, GRC, SOC Support, and Secure Software Development. Our mission is to protect and enhance federal systems through advanced tools, proven frameworks, and expert teams.
Position Summary We are seeking a skilled Microsoft Sentinel Security Engineer to support the implementation, configuration, and optimization of security operations using Microsoft Sentinel. The ideal candidate will be responsible for designing advanced detection logic, integrating data sources, building analytic rules, and automating threat responses. This role plays a vital part in EastBay Systems’ mission to secure our clients’ cloud and hybrid environments against emerging cyber threats.
Key Responsibilities
Deploy, configure, and manage Microsoft Sentinel for enterprise security monitoring
Integrate Azure-native and third-party log sources and data connectors into Sentinel
Develop and fine-tune analytic rules, workbooks, dashboards, hunting queries, and custom KQL queries
Build and automate playbooks using Azure Logic Apps for security orchestration and response (SOAR)
Analyze security alerts and provide recommendations for rule improvements
Support threat hunting, incident response, and post-incident analysis within Sentinel
Collaborate with SOC analysts, engineers, and compliance teams to ensure alignment with security policies and NIST/DoD frameworks
Stay current with Microsoft security technologies, industry trends, and threat intelligence
Required Qualifications
Bachelor’s Degree in Cybersecurity, Computer Science, Information Systems, or a related field
5+ years of experience in cybersecurity, including 2+ years working with Microsoft Sentinel
Proficiency with Kusto Query Language (KQL) for writing detection and hunting queries
Hands‑on experience with Azure Monitor, Azure Log Analytics, and Microsoft Defender XDR tools
Familiarity with threat intelligence and behavioral analysis concepts
Experience designing and maintaining SIEM alert rules and integrating with ticketing systems
Excellent verbal and written communication skills
Preferred Certifications
Microsoft Certified: Security Operations Analyst Associate
Microsoft Certified: Azure Security Engineer Associate (AZ-500)
CISSP, Security+, or GIAC certifications
Familiarity with NIST 800-53, RMF, and FedRAMP environments a plus
Benefits
Mission‑driven work protecting government and critical infrastructure systems
Competitive salary and full benefits package (medical, dental, vision)
401(k)
Hybrid work options and generous PTO
Opportunities for career growth
Apply Submit your resume via email us at
Jobs@eastbaysystems.com .
#J-18808-Ljbffr