We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Manager, Microsoft Sentinel Content Development

KPMG
life insurance, 401(k), remote work
United States, Texas, Richardson
Jun 03, 2025

Known for being a great place to work and build a career, KPMG provides audit, tax and advisory services for organizations in today's most important industries. Our growth is driven by delivering real results for our clients. It's also enabled by our culture, which encourages individual development, embraces an inclusive environment, rewards innovative excellence and supports our communities. With qualities like those, it's no wonder we're consistently ranked among the best companies to work for by Fortune Magazine, Consulting Magazine, Seramount, Fair360 and others. If you're as passionate about your future as we are, join our team.

KPMG is currently seeking a Manager, Cyber Operations to join our Enterprise Security Services Organization. This role is a remote work opportunity.

Responsibilities:
  • Apply a thorough understanding of cyber security operations, and monitoring to facilitate the day-to-day operational threat detections for security monitoring, as well as incident response activities associated with operations that provide up to 24/7 coverage; identify opportunities or implement efficiencies and improvements
  • Perform as a service owner or subject matter expert for the Microsoft security stack for threat detections in Sentinel, Defender, Purview, and more; stay abreast of the latest information security controls, practices, techniques and capabilities in the marketplace; facilitate internal skills development activities for information security personnel on the topic of detection engineering, by providing mentoring and by conducting knowledge sharing sessions
  • Develop and keep effective working relationships with multiple internal technology groups to keep alignment on strategies; promote and foster collaboration and standardization across multiple internal federated technology groups based on common technology interests and priorities; become a go-to subject matter professional to others within the firm to achieve the required goals and objectives and provide input into business cases and presentations to leadership; produce operating metrics, and key performance indicators and provide data pull support for internal audits
  • Utilize an operational understanding of log parsing in large data sets and queries for multiple threat detection data sources across various disparate environments to facilitate threat detection and threat hunt use cases; use a strong understanding of the CI/CD process for development and deployment of detections as code; implement automation and orchestration to improve efficiency and effectiveness of security monitoring and response processes; document processes and procedures in the form of playbooks and reference guides
  • Define security configuration for monitoring tools, including alerts, correlation rules, and reporting; leverage a combination of vendor products and services, open source and custom developed utilities; integrate processes and technologies, with the objective of a "single pane of glass" for monitoring and comprehensive security response process
Qualifications:
  • Minimum five years of recent experience in cyber security operations in threat detection engineering in a multi-cloud/multi-vendor large enterprise environment, with strong experience with scripting or automation
  • Bachelor's degree from an accredited college or university is preferred; relevant certifications including Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), Certificate of Cloud Security Knowledge (CCSK), GIAC Security Essentials Certification (GSEC) , GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Examiner (GCFE), GIAC Certified Forensic Analyst (GCFA), SC-200, Certified Ethical Hacker (CEH), and AZ-900 are preferred
  • Background leading meetings and operating effectively in a matrixed environment; experience with data science parsing logs with very large data sets from many disparate data source types, as well as defining security monitoring rules, monitoring events; demonstrated network and administration skills with Linux, Windows, cloud security, Active Directory, SIEM and security infrastructure (such as Microsoft Sentinel and related technology stack, including Microsoft Defender and Purview) are relevant
  • Both project and operational experience in threat detection engineering, security monitoring, security operations, and incident creation, preferably within a professional services firm or similar environment
  • Excellent verbal/written communication, collaboration, analytical and presentation skills to lead an environment driven by customer service and teamwork
  • Ability to participate in development of resource plans and project estimation
  • Applicants must be authorized to work in the U.S. without the need for employment-based visa sponsorship now or in the future; KPMG LLP will not sponsor applicants for U.S. work visa status for this opportunity (no sponsorship is available for H-1B, L-1, TN, O-1, E-3, H-1B1, F-1, J-1, OPT, CPT or any other employment-based visa)

KPMG complies with all local/state regulations regarding displaying salary ranges. If required, the ranges displayed below or via the URL below are specifically for those potential hires who will work in the location(s) listed. Any offered salary is determined based on relevant factors such as applicant's skills, job responsibilities, prior relevant experience, certain degrees and certifications and market considerations. In addition, the firm is proud to offer a comprehensive, competitive benefits package, with options designed to help you make the best decisions for yourself, your family, and your lifestyle. Available benefits are based on eligibility. Our Total Rewards package includes a variety of medical and dental plans, vision coverage, disability and life insurance, 401(k) plans, and a robust suite of personal well-being benefits to support your mental health. Depending on job classification, standard work hours, and years of service, KPMG provides Personal Time Off per fiscal year. Additionally, each year the firm publishes a calendar of holidays to be observed during the year and provides two firmwide breaks each year where employees will not be required to use Personal Time Off; one is at year end and the other is around the July 4th holiday. Additional details about our benefits can be found towards the bottom of our KPMG US Careers site at "Benefits & How We Work".
Follow this link to obtain salary ranges by city outside of CA:

https://kpmg.com/us/en/how-we-work/pay-transparency.html/?id=7465_9_25
California Salary Range: $101200 - $215100

KPMG LLP (the U.S. member firm of KPMG International) offers a comprehensive compensation and benefits package. KPMG is an equal opportunity employer. KPMG complies with all applicable federal, state and local laws regarding recruitment and hiring. All qualified applicants are considered for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, citizenship status, disability, protected veteran status, or any other category protected by applicable federal, state or local laws. The attached link contains further information regarding the firm's compliance with federal, state and local recruitment and hiring laws. No phone calls or agencies please.

KPMG does not currently require partners or employees to be fully vaccinated or test negative for COVID-19 in order to go to KPMG offices, client sites or KPMG events, except when mandated by federal, state or local law. In some circumstances, clients also may require proof of vaccination or testing (e.g., to go to the client site).

KPMG recruits on a rolling basis. Candidates are considered as they apply, until the opportunity is filled. Candidates are encouraged to apply expeditiously to any role(s) for which they are qualified that is also of interest to them.

Los Angeles County applicants: Material job duties for this position are listed above. Criminal history may have a direct, adverse, and negative relationship with some of the material job duties of this position. These include the duties and responsibilities listed above, as well as the abilities to adhere to company policies, exercise sound judgment, effectively manage stress and work safely and respectfully with others, exhibit trustworthiness, and safeguard business operations and company reputation. Pursuant to the California Fair Chance Act, Los Angeles County Fair Chance Ordinance for Employers, Fair Chance Initiative for Hiring Ordinance, and San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.

Applied = 0

(web-67f776f9dc-pvlp6)