Truveta provides unprecedented real-world data and real-time intelligence, powered by a dataset built with and owned by US health systems united in a mission of Saving Lives with Data. Together, we power breakthrough medical discoveries, accelerate regulatory-grade evidence, and improve patient care. Today, Truveta enables research on more than 130 million de-identified patients across the US.
Achieving Truveta’s ambitious mission requires an incredible team of talented and inspired people with a special combination of health, software and big data experience who share our company values.
Responsibilities
Incident Response
Handle investigation and response to security incidents across endpoints, identities, email, cloud workloads, and SaaS applications
Act as a senior escalation point for SOC analysts during complex or ambiguous security events
Participate in on-call rotations and provide senior-level escalation support when needed
Lead or contribute to post-incident reviews (RCA, postmortems) and track remediation actions to completion
Ensure incidents are accurately documented for audit, compliance, and operational learning
Maintain and improve incident response runbooks, playbooks, and escalation procedures
Support incident readiness activities, including tabletop exercises and response drills
Detection Engineering & Automation
Develop, tune, and maintain Microsoft Sentinel analytics rules to improve detection quality and reduce false positives
Design and optimize KQL queries for investigations, threat hunting, and detection engineering
Integrate and maintain log sources and data connectors in Microsoft Sentinel, ensuring data quality and proper normalization
Build and maintain SOAR automation and playbooks (Logic Apps) for alert enrichment, triage, and response
Proactive Security & Posture
Perform proactive threat hunting across Microsoft Sentinel and Defender data to identify emerging or stealthy threats
Monitor and continuously improve detection coverage and security posture (e.g., Secure Score, exposure signals)
SOC Maturity & Collaboration
Track and report on SOC and incident metrics such as MTTD, MTTA, MTTR, alert volume, and detection effectiveness
Partner with engineering and infrastructure teams to drive long-term remediation and risk reduction
Contribute to the continuous improvement of SOC tooling, automation, and operational maturity
Help define and improve SOC processes, workflows, and standards
Continuous Learning
Stay current on threat intelligence, attacker techniques (MITRE ATT&CK), and the Microsoft security roadmap
Key Qualifications
The knowledge, skills, and abilities typically acquired through the completion of a Bachelor’s degree in Cyber Security, Computer Science, Information Security, Information Systems, or a related field, or equivalent practical experience.
5+ years of experience in Security Operations (SOC), Incident Response, or Detection & Response role, with demonstrated ownership of complex security incidents.
Hands-on experience with Microsoft Sentinel (SIEM) and Microsoft Defender XDR (Defender for Endpoint, Identity, Office 365, Cloud Apps).
Proficiency in KQL (Kusto Query Language) for investigations, threat hunting, and detection engineering.
Experience designing, tuning, and maintaining SIEM detections and SOAR automation, including alert triage and response workflows.
Solid understanding of Azure cloud architecture, core services, and native security controls.
Familiarity with Azure Entra ID, identity security concepts, RBAC, and IAM-related threats.
Experience with handing high-severity security incidents, including cross-team coordination and stakeholder communication.
Familiarity with MITRE ATT&CK, threat actor techniques, and modern attack methodologies across cloud, identity, and endpoint environments.
Experience supporting on-call rotations and working in a 24/7 or follow-the-sun SOC environment.
Strong written and verbal communication skills, with the ability to explain technical issues to both technical and non-technical audiences.
Ability to mentor junior analysts and contribute to the continuous improvement of SOC processes and tooling.
Relevant certifications such as Microsoft Security Operations Analyst Associate, Azure Security Engineer Associate, SC-200, SC-100, CySA+, GCIH, GCIA, CISSP, or similar are strongly preferred.
Why Truveta?
Be a part of building something special. Now is the perfect time to join Truveta. We have strong, established leadership with decades of success. We are well-funded. We are building a culture that prioritizes people and their passions across personal, professional, and everything in between. Join us as we build an amazing company together.
Truveta is committed to creating a diverse, inclusive, and empowering workplace. We believe that having employees, interns, and contactors with diverse backgrounds enables Truveta to better meet our mission and serve patients and health communities around the world. We recognize that opportunities in technology historically excluded and continue to disproportionately exclude Black and Indigenous people, people of color, people from working class backgrounds, people with disabilities, and LGBTQIA+ people. We strongly encourage individuals with these identities to apply even if you don’t meet all of the requirements.
Software Development Technology Information And Internet And IT Services And IT Consulting
What We Offer
About the Company
Searching, interviewing and hiring are all part of the professional life. The TALENTMATE Portal idea is to fill and help professionals doing one of them by bringing together the requisites under One Roof. Whether you're hunting for your Next Job Opportunity or Looking for Potential Employers, we're here to lend you a Helping Hand.
Disclaimer: talentmate.com is only a platform to bring jobseekers & employers together.
Applicants
are
advised to research the bonafides of the prospective employer independently. We do NOT
endorse any
requests for money payments and strictly advice against sharing personal or bank related
information. We
also recommend you visit Security Advice for more information. If you suspect any fraud
or
malpractice,
email us at abuse@talentmate.com.
You have successfully saved for this job. Please check
saved
jobs
list
Applied
You have successfully applied for this job. Please check
applied
jobs list
Do you want to share the
link?
Please click any of the below options to share the job
details.
Report this job
Success
Successfully updated
Success
Successfully updated
Thank you
Reported Successfully.
Copied
This job link has been copied to clipboard!
Apply Job
Upload your Profile Picture
Accepted Formats: jpg, png
Upto 2MB in size
Your application for Senior Security Engineer - SecOps
has been successfully submitted!
To increase your chances of getting shortlisted, we recommend completing your profile.
Employers prioritize candidates with full profiles, and a completed profile could set you apart in the
selection process.
Why complete your profile?
Higher Visibility: Complete profiles are more likely to be viewed by employers.
Better Match: Showcase your skills and experience to improve your fit.
Stand Out: Highlight your full potential to make a stronger impression.
Complete your profile now to give your application the best chance!