What are the responsibilities and job description for the Microsoft Sentinel Software Developer (SIEM/SOAR) position at Jobs via Dice?
Trigyn's direct government client in Austin, Texas has a requirement for a Microsoft Sentinel Software Developer. The particulars of the opportunity are below:
Description:
The Software Developer performs advanced (senior-level) software development work focused on designing, building, testing, and optimizing Microsoft Sentinel capabilities for projects. This role is responsible for developing custom automation playbooks, analytics rules, behavioral models, connectors, and integrations to support SOAR and UEBA functionality. The position works under limited supervision with considerable latitude for initiative, independent judgment, and technical leadership.
Essential Job Functions:
Microsoft Sentinel SOAR Development (40%)
Knowledge of:
TRIGYN TECHNOLOGIES, INC. is an EQUAL OPPORTUNITY EMPLOYER and has been in business for 35 years. TRIGYN is an ISO 9001:2015, ISO 27001:2013 (ISMS),ISO 20000:2018 and CMMI Level 5 certified company.
Description:
The Software Developer performs advanced (senior-level) software development work focused on designing, building, testing, and optimizing Microsoft Sentinel capabilities for projects. This role is responsible for developing custom automation playbooks, analytics rules, behavioral models, connectors, and integrations to support SOAR and UEBA functionality. The position works under limited supervision with considerable latitude for initiative, independent judgment, and technical leadership.
Essential Job Functions:
Microsoft Sentinel SOAR Development (40%)
- Designs, develops, tests, and deploys Sentinel SOAR automation playbooks using Azure Logic Apps, Azure Functions, ARM templates, and REST APIs.
- Creates automated workflows for alert enrichment, triage, response actions, notification processes, and case management.
- Integrates Sentinel with third-party systems (EDR, IAM, ticketing systems, email gateways, firewalls, etc.) to automate security operations.
- Develops custom UEBA detection rules, anomaly models, ML-based behavior patterns, and advanced hunting queries (KQL).
- Builds and maintains analytics content, data parsers, normalization rules, and entity behavior profiles.
- Evaluates behavioral anomalies and collaborates with cybersecurity teams to fine-tune detection logic.
- Designs and implements custom data connectors, ingestion pipelines, and data transformation logic.
- Creates dashboards, workbooks, hunting queries, and detection-as-code assets.
- Performs platform tuning to improve performance, reduce noise, and align to MITRE ATT&CK and Zero Trust principles.
- Develops supporting code modules, scripts, microservices, and helper APIs using Python, PowerShell, .NET, or similar languages.
- Works with DevOps pipelines, CI/CD processes, version control, and infrastructure-as-code where applicable.
- Writes technical design documents, SOPs, architecture diagrams, and automation runbooks.
- Collaborates with CISO Office, and cross-functional stakeholders on requirements, testing, and deployment.
- Provides Tier III support for Sentinel engineering issues and participates in after-action reviews when needed.
Knowledge of:
- Microsoft Sentinel architecture, SOAR, and UEBA capabilities.
- Azure cloud services, Logic Apps, Azure Functions, Event Hubs, Key Vault, and Azure AD.
- Security operations processes (triage, threat detection, incident response, threat modeling).
- MITRE ATT&CK, NIST CSF, Zero Trust Architecture concepts.
- Programming and scripting languages (Python, PowerShell, KQL, C#, JavaScript, or equivalent).
- CI/CD pipelines, DevOps practices, and Git-based version control.
- API integrations and JSON/YAML structures.
- Building Logic App workflows and custom Sentinel automation playbooks.
- Writing complex KQL queries for analytics, hunting, and behavioral detection.
- Developing custom connectors, data maps, and parsers.
- Designing and optimizing UEBA detection models.
- Debugging SOAR workflows and resolving integration issues.
- Communicating technical information clearly to both technical and non-technical audiences.
- Work independently and take ownership of complex development tasks.
- Translate security requirements into scalable technical solutions.
- Analyze threat behaviors and develop meaningful detections.
- Work collaboratively with cybersecurity, infrastructure, and application teams.
- Manage multiple work assignments and meet deadlines.
TRIGYN TECHNOLOGIES, INC. is an EQUAL OPPORTUNITY EMPLOYER and has been in business for 35 years. TRIGYN is an ISO 9001:2015, ISO 27001:2013 (ISMS),ISO 20000:2018 and CMMI Level 5 certified company.