Castille Resources logo

Cybersecurity Sentinel Consultant

Castille Resources
Remote
Other

This is a remote position.

LocationRemote
Engagement Type: Project-based Assignment; B2B Contract
  (Outside IR35)
Duration: 6 months with auto renew
Timezone: CET ± 2 hours

Be part of our Global Engineering Network!

One of our clients in the IT Services sector is looking for a CyberSecurity Sentinel Consultant to lead the design, implementation, and management of advanced threat detection and response capabilities using Microsoft Sentinel. The ideal candidate will play a pivotal role in securing our digital assets, optimizing our SIEM environment, and mentoring junior team members. This role requires deep technical expertise in cloud security, SIEM, threat detection, incident response, and automation.


Key Deliverables
  • Design, deploy, and manage Microsoft Sentinel for enterprise-scale environments.
  • Create and optimize data connectors, workbooks, analytics rules, watchlists, and threat detection rules.
  • Tune and customize Sentinel to minimize false positives and enhance detection capabilities.
  • Build advanced detections using KQL and threat intelligence sources.
  • Lead investigations of security incidents and manage end-to-end incident response workflows.
  • Develop and implement SOAR playbooks using Logic Apps within Sentinel.
  • Automate incident triage, enrichment, and response workflows.
  • Collaborate with SOC analysts to continuously improve detection and response playbooks.
  • Integrate Microsoft Sentinel with Microsoft Defender, Azure Security Center, Microsoft 365 Defender, and third-party tools.
  • Ensure visibility across hybrid environments, including on-premise, Azure, AWS, and M365 ecosystems.
  • Ensure SIEM configurations align with regulatory frameworks (e.g., NIST, ISO 27001, GDPR).
  • Generate dashboards and reports for various stakeholders (security, compliance, management).








Requirements

Ideal Profile
  • 5+ years of experience in cybersecurity roles, with at least 2–3 years in Sentinel engineering or similar SIEM platforms.

  • Advanced proficiency in Microsoft Sentinel, including KQL (Kusto Query Language), Logic Apps, and Azure Monitor.

  • Strong understanding of SIEM/SOAR best practices, threat hunting, and security operations.

  • Familiarity with MITRE ATT&CK framework, threat intelligence platforms, and behavioral analytics.

  • Solid knowledge of cloud environments (Azure, AWS, or GCP), particularly Azure security tools.

  • Experience with scripting and automation tools (e.g., PowerShell, Python, JSON).

  • Relevant certifications (e.g., SC-200, AZ-500, GCIA, GCIH, or CISSP) are highly desirable.

Why Partner with Us?

·         Clear scope with no ambiguity over deliverables.

·         Opportunity for repeat engagements based on performance.


Selection Process

1.      Proposal Submission

  • Submit your professional profile/CV by applying on the role.

2.     Business Alignment Call

  • 30-min virtual discussion with Human Capital Consultant to review scope

3.      Verification

  • Opportunity to complete Castille Vetting (background/compliance checks)

4.      Client Skills Review

  • Direct interview with end client to discuss project specifics

5.      Project-specific technical assessment (if required)

Ongoing Business Support

Access to CX guidance and market insights through our professional network.