The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment.
The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. In this role, you collaborate with business stakeholders, architects, identity administrators, Azure administrators, and endpoint administrators to secure IT systems for the organization.
Learn to reduce organizational risk by:
- Rapidly remediating active attacks in the environment.
- Advising on improvements to threat protection practices.
- Referring violations of organizational policies to appropriate stakeholders.
Learning Objectives
- Introduction to Microsoft 365 Threat Protection
- Mitigate Incidents with Microsoft 365 Defender
- Protect Identities using Azure AD Identity Protection
- Remediate Risks with Microsoft Defender for Office 365
- Secure Cloud Apps and Services with Microsoft Defender for Cloud Apps
- Respond to Data Loss Prevention Alerts in Microsoft 365
- Manage Insider Risk in Microsoft Purview
- Investigate Threats using Audit Features in Microsoft 365 Defender and Microsoft Purview
- Protect Against Threats with Microsoft Defender for Endpoint
- Utilize Threat Intelligence and Security Analytics in Microsoft Sentinel
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.