Azure Cloud Cyber Security SME-100% Remote - Georgia IT Inc.
Chicago, IL
About the Job
Position: Azure Cloud Cyber Security SME
Location: 100% Remote
Duration: 12 Months
Rate: DOE
US Citizens and Green cards are Preferred. No 3rd party corp corp to acceptable for this role.
Location: 100% Remote
Duration: 12 Months
Rate: DOE
US Citizens and Green cards are Preferred. No 3rd party corp corp to acceptable for this role.
- Identity and Access Management – Entra ID RBAC, Conditional Access Policies, Active Directory ID, PIM/PAM, Active Directory Connect, AD FS, ID Protection, MFA
- Security monitoring includes log aggregation/centralization, correlation, and alerting of security events and incidents.
- Hands-on experience with Azure policy design, policy exemption, compliance and non-compliance dashboard understanding, remediation task for non-compliance.
- Experience in Cloud adoption framework, well architected framework, security solution design.
- Expertise in cybersecurity solutions like Microsoft Defender for Cloud, Defender for endpoint, SOC, MDR, SIEM, SOAR, DAM, etc.
- Knowledge of MS purview, DLP, Insider risk policies etc.
- Configure rules for real-time alerting in SIEM tool for events, analytic rules, automation rules, hunting queries & Playbook.
- Knowledge of 3rd party tools CrowdStrike, LogRhythm, Netspoke, semperis, Illumio
- Participates in the incident response and investigation process.
- Knows about network architecture and protocols like TCP/IP, HTTP, etc.
- Security Services - Security Operation Center, Key Vault, Log Analytics, Monitor
- Apply and implement cloud security technologies.
- Review existing cloud security measures and processes.
- Implement security as a core part of all design and development of the client's cloud solutions.
- Recommend best practices based on leading industry insights.
- Map security controls to compliance requirements for cloud environments.
- Provide incident response support as a key stakeholder.
- Identify, triage, and remediate security detections and anomalies.
- Assess vulnerabilities and attacker tactics, techniques, and procedures (TTP) and provide defensive action to locate and prevent threats.
- Work creatively and analytically in a problem-solving environment.
Source : Georgia IT Inc.