Cloud Incident Response Training- Contract Instructors
Quick Summary
• Deliver live virtual training that explores the differences between cloud and on-premises incident response,
• Proven expertise in cloud incident response, with a focus on Microsoft Azure security tools and frameworks. • Prior experience teaching technical content to security professionals,
We are looking for experienced instructors to deliver a series of virtual Cloud Incident Response (IR) courses designed for SOC analysts, incident responders, and security professionals transitioning to or specializing in cloud security. These courses span foundational, intermediate, and advanced levels, with a focus on Microsoft Azure tools, methodologies, and practical applications for incident response and forensics.
Responsibilities
~2 min readAs a contract instructor, you will:
• Deliver live virtual training that explores the differences between cloud and on-premises incident response, ensuring participants understand the Shared Responsibility Model and its implications for security investigations.
• Teach participants to analyze Azure core functions, including virtual machines (VMs), storage, networking, and Identity Access Management (IAM), and guide them in navigating Azure logging sources and log types.
• Provide hands-on instruction on configuring and utilizing tools like PowerShell modules, Microsoft Defender Suite, and Microsoft Sentinel for security orchestration, automation, and response (SOAR).
• Help students investigate and mitigate threats by teaching detection of common Azure attack patterns (e.g., password spraying, lateral movement, data exfiltration) and conducting threat hunting using Kusto Query Language (KQL).
• Guide advanced students in performing in-depth virtual machine forensics in Azure, including introductory memory analysis, while addressing challenges in forensic analysis of serverless functions and containers.
• Support proactive defense strategies by teaching Azure-specific playbook creation, threat modeling, and leveraging cloud-native tools for artifact collection, automation, and advanced detection.
• Facilitate labs and exercises that allow participants to apply new skills in realistic scenarios, such as configuring Microsoft Sentinel, integrating threat intelligence, and mapping security controls to frameworks like MITRE ATT&CK®.
• Create an engaging and interactive learning environment, answering participant questions and ensuring key objectives are met.
Requirements
~2 min readRequired:
• Proven expertise in cloud incident response, with a focus on Microsoft Azure security tools and frameworks.
• Prior experience teaching technical content to security professionals, preferably in virtual environments.
• In-depth understanding of Azure architecture, logging sources, PowerShell, Microsoft Defender Suite, Sentinel, and SOAR.
• Knowledge of threat hunting, advanced log analysis, and cloud-specific attack patterns.
Preferred:
• Relevant certifications (e.g., Azure Security Engineer, Azure Administrator, CISSP, GCFA, GCIH).
• Familiarity with conducting forensic analysis of virtual machines, containers, and serverless functions in Azure.
• Experience designing and delivering incident response playbooks and cloud automation workflows
Required:
• Proven expertise in cloud incident response, with a focus on Microsoft Azure security tools and frameworks.
• Prior experience teaching technical content to security professionals, preferably in virtual environments.
• In-depth understanding of Azure architecture, logging sources, PowerShell, Microsoft Defender Suite, Sentinel, and SOAR.
• Knowledge of threat hunting, advanced log analysis, and cloud-specific attack patterns.
Preferred:
• Relevant certifications (e.g., Azure Security Engineer, Azure Administrator, CISSP, GCFA, GCIH).
• Familiarity with conducting forensic analysis of virtual machines, containers, and serverless functions in Azure.
• Experience designing and delivering incident response playbooks and cloud automation workflows
Cybervance is an equal opportunity employer. All qualified applicants are considered for employment without regard to race, color, age, religion, sex, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other category protected by applicable federal, state, or local laws.
Location & Eligibility
Listing Details
- First seen
- March 26, 2026
- Last seen
- May 5, 2026
Posting Health
- Days active
- 39
- Repost count
- 0
- Trust Level
- 30%
- Scored at
- May 5, 2026
Signal breakdown
Please let Cybervance know you found this job on Jobera.
2 other jobs at Cybervance
View all →Explore open roles at Cybervance.
Similar Cloud jobs
View all →Browse Similar Jobs
Stay ahead of the market
Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.
No spam. Unsubscribe at any time.
