ISI Enterprises is seeking a SOC Analyst II with a focus on the Microsoft security stack to enhance their cybersecurity operations. This hybrid role in Herndon, Virginia involves threat detection, response, and operationalizing Microsoft Sentinel.
Location: Hybrid – Lorton, VA Clearance: U.S. Citizenship required; Active Clearance preferred or ability to obtain. On the first day of employment, candidates must visit HQ (compensated) to pick up equipment and complete in-person I-9 verification.. About the Role Industrial Security Integrators (ISI) is actively building a next-generation Security Operations Center (SOC) centered around the Microsoft security ecosystem. As part of our growing cybersecurity team, the SOC Analyst II will play a critical role in maturing our detection capabilities, tuning signal-to-noise ratios, and helping operationalize advanced features in the Microsoft 365 G5 stack. The SOC Analyst II will be a key member of our cybersecurity operations team, responsible for leveraging Microsoft 365 G5 technologies to hunt, detect, and respond to threats. You will help us build and tune our Microsoft Sentinel SIEM, automate workflows, and strengthen our overall security posture using the Microsoft ecosystem. Key Responsibilities • Operationalize Microsoft Sentinel as our central SIEM: design, implement, and tune analytics rules, workbooks, automation (Logic Apps), and connectors. • Manage and maintain Defender for Endpoint, Defender for Identity, Defender for Office 365, and Microsoft Defender Vulnerability Management (MDVM) across client and internal environments. • Perform advanced alert triage, correlation, and investigation using Microsoft security signals. • Write, tune, and manage KQL-based detection rules to reduce false positives and improve detection efficacy. • Utilize Power BI to create clear, informative dashboards for threat visibility and SOC metrics. • Support threat hunting activities across Microsoft 365 workloads and Azure infrastructure. • Collaborate with IT and engineering teams to ensure secure configurations of Microsoft Entra ID (formerly Azure AD) including Conditional Access, Identity Protection, and MFA policies. • Create and maintain detection runbooks, incident response guides, and client-facing artifacts. • Monitor emerging threats relevant to Microsoft environments and adapt detection logic accordingly. • Assist in onboarding new MSP clients into our Microsoft-based SOC workflows and toolsets. Required Qualifications • 3+ years of experience in a SOC, MDR, or threat detection role. • Proven hands-on experience with Microsoft Sentinel (KQL, analytic rules, playbooks, incident response workflows). • Strong knowledge of Microsoft Defender XDR suite: Defender for Endpoint, Identity, Office 365, and MDVM. • Familiarity with Microsoft Entra ID (formerly Azure AD), Conditional Access, and authentication protocols. • Comfort with scripting and automation (e.g., PowerShell, Logic Apps, or Sentinel playbooks). • Experience with Power BI for dashboard creation and reporting. • Solid understanding of attacker TTPs and frameworks like MITRE ATT&CK. • Experience supporting clients in multi-tenant or MSP environments. • Ability to communicate clearly with technical and non-technical stakeholders. Preferred Qualifications • Microsoft certifications such as: • SC-200: Microsoft Security Operations Analyst • SC-100: Microsoft Cybersecurity Architect • SC-300: Identity and Access Administrator • Experience in regulated environments (FedRAMP, CMMC, NIST 800-171). Why ISI? At ISI, we're building a modern SOC from the ground up using the Microsoft security stack, including Sentinel, Defender, and Entra. This is a high-impact role where you'll help shape our detection and response capabilities, support both internal and MSP environments, and work with FedRAMP-authorized tools in a mission-driven setting. If you're ready to go beyond alert triage and truly build, tune, and lead with Microsoft technologies — this is the place. Powered by JazzHR Xt7rwQOajE
Microsoft is seeking a Security Analyst II to enhance its security team, focusing on protecting customers from various threats through effective investigations. The role involves analyzing data, conducting threat research, and improving incident response capabilities.
Ascot Group is seeking a Cybersecurity Defense SOC Analyst (L2) to enhance their 24x7 Cybersecurity Defense function in Chicago. The role involves investigating security incidents, improving detection content, and supporting incident response activities.
ISI Enterprises is seeking a SOC Analyst II with a focus on the Microsoft security stack to enhance their cybersecurity operations. This hybrid role in Herndon, Virginia involves threat detection, response, and operationalizing Microsoft Sentinel.
Eccalon, LLC is seeking a Compliance Security and Microsoft Cloud Analyst to enhance cybersecurity compliance and cloud security engineering. This role focuses on DoD frameworks and Microsoft Azure Government and M365 GCC High security controls.
Support Tech LLC is seeking an IT Security Specialist with a focus on Microsoft Azure and 365 to enhance cybersecurity measures. This remote contract role requires expertise in cloud security and relevant certifications.
PRI Technology is seeking a Sr. Security Operations Center (SOC) Analyst to provide mentorship and lead incident response efforts in Austin, Texas. The role involves advanced investigations, threat hunting, and enhancing SOC processes.
Microsoft is seeking a Security Analyst II to enhance its security team, focusing on protecting customers from various threats through effective investigations. The role involves analyzing data, conducting threat research, and improving incident response capabilities.
Ascot Group is seeking a Cybersecurity Defense SOC Analyst (L2) to enhance their 24x7 Cybersecurity Defense function in Chicago. The role involves investigating security incidents, improving detection content, and supporting incident response activities.
ISI Enterprises is seeking a SOC Analyst II with a focus on the Microsoft security stack to enhance their cybersecurity operations. This hybrid role in Herndon, Virginia involves threat detection, response, and operationalizing Microsoft Sentinel.
Eccalon, LLC is seeking a Compliance Security and Microsoft Cloud Analyst to enhance cybersecurity compliance and cloud security engineering. This role focuses on DoD frameworks and Microsoft Azure Government and M365 GCC High security controls.
Support Tech LLC is seeking an IT Security Specialist with a focus on Microsoft Azure and 365 to enhance cybersecurity measures. This remote contract role requires expertise in cloud security and relevant certifications.
PRI Technology is seeking a Sr. Security Operations Center (SOC) Analyst to provide mentorship and lead incident response efforts in Austin, Texas. The role involves advanced investigations, threat hunting, and enhancing SOC processes.
Microsoft is seeking a Security Analyst II to enhance its security team, focusing on protecting customers from various threats through effective investigations. The role involves analyzing data, conducting threat research, and improving incident response capabilities.
Ascot Group is seeking a Cybersecurity Defense SOC Analyst (L2) to enhance their 24x7 Cybersecurity Defense function in Chicago. The role involves investigating security incidents, improving detection content, and supporting incident response activities.
ISI Enterprises is seeking a SOC Analyst II with a focus on the Microsoft security stack to enhance their cybersecurity operations. This hybrid role in Herndon, Virginia involves threat detection, response, and operationalizing Microsoft Sentinel.