Get C2C/W2 Jobs & hotlist update

Urgent Need | TWK_3058 Microsoft Sentinel Developer position with State of Texas | Austin, TX#Onsite | Local profiles only | min 3 Years of Microsoft Sentinel exp must

Contract
  • Contract
  • Anywhere

State of Texas

Share profiles along with Job ID number

S E K H A R @ TEKWINGS. COM

 

Note: If this email is not relevant to you, sorry for your Inconvenience
Share profiles ASAP before January 7, 2026 at 2PM (CST)

Requirement details:
Internal job ID:TWK_3058
Microsoft Sentinel Developer
State of Texas
Austin, TX #Onsite

NOTE:
Theposition is ONSITE at the location listed above (NO REMOTE WORK)
The program will only allow candidates who are LOCAL TO THE TEXAS STATE ONLY.   
Active Texas DL Must for submission
Please do not submit candidates who are currently out of state and are planning to move to Texas. Candidates must already reside in Texas.
Interviews will be conducted : 
☐    By Phone
☒    In person
☒    Through Microsoft Teams

Total EXP:10+ years must

Required Skills:
Required Two (2) years of full-time experience in software development, cloud engineering, SIEM engineering, or cybersecurity engineering.
Three (3) or more years of hands-on technical experience with Microsoft Sentinel.
Experience working in a government, healthcare, or regulatory environment.
 Job Description:
This role is responsible for developing custom automation playbooks, analytics rules, behavioral models, connectors, and integrations to support SOAR and UEBA functionality. The position works under limited supervision with considerable latitude for initiative, independent judgment, and technical leadership.

Essential Job Functions (EJFs)

1. Microsoft Sentinel SOAR Development (40%)

·        Designs, develops, tests, and deploys Sentinel SOAR automation playbooks using Azure Logic Apps, Azure Functions, ARM templates, and REST APIs.

·        Creates automated workflows for alert enrichment, triage, response actions, notification processes, and case management.

·        Integrates Sentinel with third-party systems (EDR, IAM, ticketing systems, email gateways, firewalls, etc.) to automate security operations.

2. UEBA & Analytics Engineering (30%)

·        Develops custom UEBA detection rules, anomaly models, ML-based behavior patterns, and advanced hunting queries (KQL).

·        Builds and maintains analytics content, data parsers, normalization rules, and entity behavior profiles.

·        Evaluates behavioral anomalies and collaborates with cybersecurity teams to fine-tune detection logic.

3. SIEM Content Development & Platform Engineering (15%)

·        Designs and implements custom data connectors, ingestion pipelines, and data transformation logic.

·        Creates dashboards, workbooks, hunting queries, and detection-as-code assets.

·        Performs platform tuning to improve performance, reduce noise, and align to MITRE ATT&CK and Zero Trust principles.

4. Application Development & Integration (10%)

·        Develops supporting code modules, scripts, microservices, and helper APIs using Python, PowerShell, .NET, or similar languages.

·        Works with DevOps pipelines, CI/CD processes, version control, and infrastructure-as-code where applicable.

5. Documentation, Collaboration & Support (5%)

·        Writes technical design documents, SOPs, architecture diagrams, and automation runbooks.

·        Collaborates with DSHS, HHSC CISO Office, and cross-functional stakeholders on requirements, testing, and deployment.

·        Provides Tier III support for Sentinel engineering issues and participates in after-action reviews when needed.

 

Knowledge, Skills, and Abilities (KSAs)

Knowledge of:

·        Microsoft Sentinel architecture, SOAR, and UEBA capabilities.

·        Azure cloud services, Logic Apps, Azure Functions, Event Hubs, Key Vault, and Azure AD.

·        Security operations processes (triage, threat detection, incident response, threat modeling).

·        MITRE ATT&CK, NIST CSF, Zero Trust Architecture concepts.

·        Programming and scripting languages (Python, PowerShell, KQL, C#, JavaScript, or equivalent).

·        CI/CD pipelines, DevOps practices, and Git-based version control.

·        API integrations and JSON/YAML structures.

Skills in:

·        Building Logic App workflows and custom Sentinel automation playbooks.

·        Writing complex KQL queries for analytics, hunting, and behavioral detection.

·        Developing custom connectors, data maps, and parsers.

·        Designing and optimizing UEBA detection models.

·        Debugging SOAR workflows and resolving integration issues.

·        Communicating technical information clearly to both technical and non-technical audiences.

Abilities to:

·        Work independently and take ownership of complex development tasks.

·        Translate security requirements into scalable technical solutions.

·        Analyze threat behaviors and develop meaningful detections.

·        Work collaboratively with cybersecurity, infrastructure, and application teams.

 

·        Manage multiple work assignments and meet deadlines.

SKILLS AND QUALIFICATIONS

 

 

Years
Required
Experience
4
Required
Graduation from an accredited four-year college or university with major coursework in computer science, computer information systems, software engineering, cybersecurity, or a related field.
2
Required
Two (2) years of full-time experience in software development, cloud engineering, SIEM engineering, or cybersecurity engineering.
2
Required
Two (2) years of full-time experience in software development, cloud engineering, SIEM engineering, or cybersecurity engineering.
3
Preferred
Three (3) or more years of hands-on technical experience with Microsoft Sentinel.
1
Preferred
Experience developing UEBA models, anomaly detection rules, and behavior-based analytics.
1
Preferred
Experience building Security Automation Playbooks (SOAR).
1
Preferred
Microsoft certifications such as: SC-200: Security Operations Analyst, AZ-900 / AZ-104, SC-100 / SC-300
1
Preferred
Experience integrating Sentinel with EDR, IAM, firewalls, and ticketing systems.
1
Preferred
Experience with DevOps pipelines (GitHub, Azure DevOps).
1
Preferred
Experience working in a government, healthcare, or regulatory environment.

 

Thanks & Regards
 
Sekhar | Sr.IT Technical Recruiter

 

Tekwings LLC
Email :  sekhar@tekwings.com 
 D: 512-593-6391

Tekwings Requirements Email group  : https://groups.google.com/d/forum/tekwings_requrements_group1

LinkedIn Group: https://www.linkedin.com/groups/10421204/

LinkedIn: https://www.linkedin.com/in/sekhar-u-27b11a166/

 

To apply for this job email your details to SEKHAR@TEKWINGS.COM

×

Post your C2C job instantly

Quick & easy posting in 10 seconds

Keep it concise - you can add details later
Please use your company/professional email address
Simple math question to prevent spam