Enable job alerts via email!

SIEM Engineer.

Coca-Cola Canada

Toronto

On-site

CAD 80,000 - 110,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading beverage company is looking for a SIEM Engineer in Toronto, Ontario. This role involves enhancing security operations using Microsoft Sentinel and automating incident responses. Candidates should have a solid background in cybersecurity, relevant certifications, and experience with SIEM and SOAR capabilities. Strong analytical and communication skills are essential for success in this position.

Qualifications

  • 3+ years of experience in security operations with SIEM and SOAR.
  • Relevant certifications such as CISSP, CEH, SC-200, or AZ-500 are a plus.
  • Familiarity with security operations tools such as firewalls and endpoint protection.

Responsibilities

  • Configure and optimize Microsoft Sentinel for security monitoring.
  • Investigate and analyze security incidents.
  • Develop and document incident response procedures.

Skills

SIEM expertise
Automation and scripting (Python, PowerShell)
Strong analytical skills
Communication skills

Education

College diploma or degree in Cybersecurity, Computer Science, or IT

Tools

Microsoft Sentinel
REST APIs
Cloud security services
Job description
About This Opportunity

We are recruiting a SIEM Engineer to join our Cybersecurity team. In this role, you will be responsible for enhancing our organization’s security operations through the integration of Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) capabilities, specifically utilizing Microsoft Sentinel.

You will work closely with cross‑functional teams to monitor, detect, and automate responses to security incidents, ensuring the organization’s network, systems, and data are secure. Your expertise in SIEM and SOAR will be key in improving the efficiency of our security processes and reducing response times to incidents.

Responsibilities
  • Configure, manage, and optimize Microsoft Sentinel for security monitoring and event detection.
  • Develop, fine‑tune, and update detection rules and analytics using KQL (Kusto Query Language).
  • Investigate and analyze security incidents, providing actionable insights and response strategies.
  • Build and maintain automation playbooks within Microsoft Sentinel to orchestrate incident response and remediation actions.
  • Integrate Sentinel with other security tools (e.g., firewalls, endpoint protection, threat intelligence platforms) to create automated workflows.
  • Create and manage automated workflows to reduce manual intervention and improve response times.
  • Monitor, update, and refine detection rules, playbooks, and automated responses to enhance efficiency.
  • Develop and document incident response procedures, ensuring proper escalation processes and timely resolution of threats.
  • Collaborate with cross‑functional teams to ensure security monitoring and response strategies align with organizational goals.
  • Ensure compliance with security policies, best practices, and regulatory requirements.
Qualifications
  • College diploma and / or degree in Cybersecurity, Computer Science, Information Technology or a related field.
  • Relevant certifications such as CISSP, CEH, SC-200, or AZ-500 are a plus.
  • 3+ years of experience in security operations, with expertise in SIEM (preferably Microsoft Sentinel) and SOAR.
  • Hands on experience with REST APIs.
  • Strong experience with Microsoft Sentinel, including the development of detection rules and queries using KQL.
  • Strong understanding of cloud‑based SIEM architecture and integration within Azure environments.
  • Hands‑on experience creating and maintaining SOAR playbooks for incident response automation.
  • Familiarity with security operations tools such as firewalls, endpoint protection (e.g., CrowdStrike, Defender), and cloud security services.
  • Experience with automation and scripting (Python, PowerShell) to enhance response capabilities.
  • Excellent analytical skills with the ability to identify trends, detect potential threats, and automate responses.
  • Strong communication skills to work with technical and non‑technical teams to define and improve security processes.
  • Knowledge of security frameworks (e.g. MITRE ATT&CK and MITRE D3FEND, NIST-CSF) and incident response best practices.
  • Ability to manage multiple tasks in a fast‑paced environment while maintaining attention to detail.
  • Continuous Learning: Staying updated with the latest security trends and Microsoft Sentinel capabilities.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.