Hello Professionals, Its a W2 role. 100% REMOTE ROLE. Though locals are preferred but not mandatory. Position: Azure Cloud Cyber Security SME- Location: Chicago, IL Duration: 12 Months experience: 8+ years Visa: any visa except OPT and CPT Identity and Access Management – Entra ID RBAC, Conditional Access Policies, Active Directory ID, PIM/PAM, Active Directory Connect, AD FS, ID Protection, MFA Security monitoring includes log aggregation/centralization, correlation, and alerting of security events and incidents. Hands-on experience with Azure policy design, policy exemption, compliance and non-compliance dashboard understanding, remediation task for non-compliance. Experience in Cloud adoption framework, well architected framework, security solution design. Expertise in cybersecurity solutions like Microsoft Defender for Cloud, Defender for endpoint, SOC, MDR, SIEM, SOAR, DAM, etc. Knowledge of MS purview, DLP, Insider risk policies etc. Configure rules for real-time alerting in SIEM tool for events, analytic rules, automation rules, hunting queries & Playbook. Knowledge of 3rd party tools CrowdStrike, LogRhythm, Netspoke, semperis, Illumio Participates in the incident response and investigation process. Knows about network architecture and protocols like TCP/IP, HTTP, etc. Security Services - Security Operation Center, Key Vault, Log Analytics, Monitor Apply and implement cloud security technologies. Review existing cloud security measures and processes. Implement security as a core part of all design and development of the client’s cloud solutions. Recommend best practices based on leading industry insights. Map security controls to compliance requirements for cloud environments. Provide incident response support as a key stakeholder. Identify, triage, and remediate security detections and anomalies. Assess vulnerabilities and attacker tactics, techniques, and procedures (TTP) and provide defensive action to locate and prevent threats. Work creatively and analytically in a problem-solving environment.
Bandipelly Varshitha’s Post
More Relevant Posts
-
100% REMOTE ROLE. Though locals are preferred but not mandatory. Please share the profiles at karunakar@collaboratesolutions.com / joshua@collaboratesolutions.com #Azure_Cloud_Cyber_Security_SME #Chicago_IL #12_Months Identity and Access Management – Entra ID RBAC, Conditional Access Policies, Active Directory ID, PIM/PAM, Active Directory Connect, AD FS, ID Protection, MFA Security monitoring includes log aggregation/centralization, correlation, and alerting of security events and incidents. Hands-on experience with Azure policy design, policy exemption, compliance and non-compliance dashboard understanding, remediation task for non-compliance. Experience in Cloud adoption framework, well architected framework, security solution design. Expertise in cybersecurity solutions like Microsoft Defender for Cloud, Defender for endpoint, SOC, MDR, SIEM, SOAR, DAM, etc. Knowledge of MS purview, DLP, Insider risk policies etc. Configure rules for real-time alerting in SIEM tool for events, analytic rules, automation rules, hunting queries & Playbook. Knowledge of 3rd party tools CrowdStrike, LogRhythm, Netspoke, semperis, Illumio Participates in the incident response and investigation process. Knows about network architecture and protocols like TCP/IP, HTTP, etc. Security Services - Security Operation Center, Key Vault, Log Analytics, Monitor Apply and implement cloud security technologies. Review existing cloud security measures and processes. Implement security as a core part of all design and development of the client’s cloud solutions. Recommend best practices based on leading industry insights. Map security controls to compliance requirements for cloud environments. Provide incident response support as a key stakeholder. Identify, triage, and remediate security detections and anomalies. Assess vulnerabilities and attacker tactics, techniques, and procedures (TTP) and provide defensive action to locate and prevent threats. Work creatively and analytically in a problem-solving environment.
To view or add a comment, sign in
-
#W2_Only 100% REMOTE ROLE. Though locals are preferred but not mandatory. Please share the profiles at karunakar@collaboratesolutions.com #Azure_Cloud_Cyber_Security_SME #Chicago_IL #12_Months Identity and Access Management – Entra ID RBAC, Conditional Access Policies, Active Directory ID, PIM/PAM, Active Directory Connect, AD FS, ID Protection, MFA Security monitoring includes log aggregation/centralization, correlation, and alerting of security events and incidents. Hands-on experience with Azure policy design, policy exemption, compliance and non-compliance dashboard understanding, remediation task for non-compliance. Experience in Cloud adoption framework, well architected framework, security solution design. Expertise in cybersecurity solutions like Microsoft Defender for Cloud, Defender for endpoint, SOC, MDR, SIEM, SOAR, DAM, etc. Knowledge of MS purview, DLP, Insider risk policies etc. Configure rules for real-time alerting in SIEM tool for events, analytic rules, automation rules, hunting queries & Playbook. Knowledge of 3rd party tools CrowdStrike, LogRhythm, Netspoke, semperis, Illumio Participates in the incident response and investigation process. Knows about network architecture and protocols like TCP/IP, HTTP, etc. Security Services - Security Operation Center, Key Vault, Log Analytics, Monitor Apply and implement cloud security technologies. Review existing cloud security measures and processes. Implement security as a core part of all design and development of the client’s cloud solutions. Recommend best practices based on leading industry insights. Map security controls to compliance requirements for cloud environments. Provide incident response support as a key stakeholder. Identify, triage, and remediate security detections and anomalies. Assess vulnerabilities and attacker tactics, techniques, and procedures (TTP) and provide defensive action to locate and prevent threats. Work creatively and analytically in a problem-solving environment.
To view or add a comment, sign in
-
100% REMOTE ROLE. Though locals are preferred but not mandatory. Position: Azure Cloud Cyber Security SME- Location: Chicago, IL Duration: 12 Months Identity and Access Management – Entra ID RBAC, Conditional Access Policies, Active Directory ID, PIM/PAM, Active Directory Connect, AD FS, ID Protection, MFA Security monitoring includes log aggregation/centralization, correlation, and alerting of security events and incidents. Hands-on experience with Azure policy design, policy exemption, compliance and non-compliance dashboard understanding, remediation task for non-compliance. Experience in Cloud adoption framework, well architected framework, security solution design. Expertise in cybersecurity solutions like Microsoft Defender for Cloud, Defender for endpoint, SOC, MDR, SIEM, SOAR, DAM, etc. Knowledge of MS purview, DLP, Insider risk policies etc. Configure rules for real-time alerting in SIEM tool for events, analytic rules, automation rules, hunting queries & Playbook. Knowledge of 3rd party tools CrowdStrike, LogRhythm, Netspoke, semperis, Illumio Participates in the incident response and investigation process. Knows about network architecture and protocols like TCP/IP, HTTP, etc. Security Services - Security Operation Center, Key Vault, Log Analytics, Monitor Apply and implement cloud security technologies. Review existing cloud security measures and processes. Implement security as a core part of all design and development of the client’s cloud solutions. Recommend best practices based on leading industry insights. Map security controls to compliance requirements for cloud environments. Provide incident response support as a key stakeholder. Identify, triage, and remediate security detections and anomalies. Assess vulnerabilities and attacker tactics, techniques, and procedures (TTP) and provide defensive action to locate and prevent threats. Work creatively and analytically in a problem-solving environment.
To view or add a comment, sign in
-
100% REMOTE ROLE. Though locals are preferred but not mandatory. Position: Azure Cloud Cyber Security SME- Location: Chicago, IL Duration: 12 Months Identity and Access Management – Entra ID RBAC, Conditional Access Policies, Active Directory ID, PIM/PAM, Active Directory Connect, AD FS, ID Protection, MFA Security monitoring includes log aggregation/centralization, correlation, and alerting of security events and incidents. Hands-on experience with Azure policy design, policy exemption, compliance and non-compliance dashboard understanding, remediation task for non-compliance. Experience in Cloud adoption framework, well architected framework, security solution design. Expertise in cybersecurity solutions like Microsoft Defender for Cloud, Defender for endpoint, SOC, MDR, SIEM, SOAR, DAM, etc. Knowledge of MS purview, DLP, Insider risk policies etc. Configure rules for real-time alerting in SIEM tool for events, analytic rules, automation rules, hunting queries & Playbook. Knowledge of 3rd party tools CrowdStrike, LogRhythm, Netspoke, semperis, Illumio Participates in the incident response and investigation process. Knows about network architecture and protocols like TCP/IP, HTTP, etc. Security Services - Security Operation Center, Key Vault, Log Analytics, Monitor Apply and implement cloud security technologies. Review existing cloud security measures and processes. Implement security as a core part of all design and development of the client’s cloud solutions. Recommend best practices based on leading industry insights. Map security controls to compliance requirements for cloud environments. Provide incident response support as a key stakeholder. Identify, triage, and remediate security detections and anomalies. Assess vulnerabilities and attacker tactics, techniques, and procedures (TTP) and provide defensive action to locate and prevent threats. Work creatively and analytically in a problem-solving environment.
To view or add a comment, sign in
-
100% REMOTE ROLE. Though locals are preferred but not mandatory. Position: Azure Cloud Cyber Security SME- Location: Chicago, IL Duration: 12 Months Rate: . on w2. Identity and Access Management – Entra ID RBAC, Conditional Access Policies, Active Directory ID, PIM/PAM, Active Directory Connect, AD FS, ID Protection, MFA Security monitoring includes log aggregation/centralization, correlation, and alerting of security events and incidents. Hands-on experience with Azure policy design, policy exemption, compliance and non-compliance dashboard understanding, remediation task for non-compliance. Experience in Cloud adoption framework, well architected framework, security solution design. Expertise in cybersecurity solutions like Microsoft Defender for Cloud, Defender for endpoint, SOC, MDR, SIEM, SOAR, DAM, etc. Knowledge of MS purview, DLP, Insider risk policies etc. Configure rules for real-time alerting in SIEM tool for events, analytic rules, automation rules, hunting queries & Playbook. Knowledge of 3rd party tools CrowdStrike, LogRhythm, Netspoke, semperis, Illumio Participates in the incident response and investigation process. Knows about network architecture and protocols like TCP/IP, HTTP, etc. Security Services - Security Operation Center, Key Vault, Log Analytics, Monitor Apply and implement cloud security technologies. Review existing cloud security measures and processes. Implement security as a core part of all design and development of the client’s cloud solutions. Recommend best practices based on leading industry insights. Map security controls to compliance requirements for cloud environments. Provide incident response support as a key stakeholder. Identify, triage, and remediate security detections and anomalies. Assess vulnerabilities and attacker tactics, techniques, and procedures (TTP) and provide defensive action to locate and prevent threats. Work creatively and analytically in a problem-solving environment.
To view or add a comment, sign in
-
AWS Security consultant. Location: Remote – Pay rate : $80/hr W2 Only Duration: 6 months with possibility of extension USC, GC only Container scanning - Our parent company has a Prisma install in place, and we are working through how to include our containers to be scanned. If this proves to not be possible, we will need assistance with implementing this within our own environment Run containers as non-root user - There are likely best practices for determining how to establish and maintaining secure user configurations in the container setup. We are uncertain that the approach we are taking is optimal Role based access control - Like #2, we have probably implemented something rudimentary for RBAC, but we need a knowledgeable resource to help us understand how to review our needs and engineer an appropriate approach Network Policies - Again, need a knowledgeable set of eyes to review our current approach for defining communication rules between pods, and teach us how to both design and implement these rules (Service Mesh) Encrypt Communication - We believe the best practice for this is to implement mutual TLS for communication, but we are unclear on where and how to do so Secure data - Best practices for protecting ETCD store, and secrets Backup - Best practices for backing up etcd and app data present in implementation Security Policies - Another area where a resource can help us evaluate our current application requirements and identify/implement "security as code" Disaster Recovery - Please contact me at Rshinnick@svam.com or cell 603-842-2045.
To view or add a comment, sign in
-
Here are the main types of IT support: 1. **Help Desk Support:** - Definition: A centralized service for handling and resolving basic IT issues like password resets, software installation problems, or minor hardware issues. - Scope: First-level support, addressing common technical problems. 2. **On-Site IT Support:** - Definition: IT support provided in person at the user or business's physical location. - Scope: Deals with complex issues requiring physical presence, such as hardware repairs or network configuration. 3. **Remote IT Support:** - Definition: Support provided remotely through internet-based tools, often using screen-sharing or remote desktop software. - Scope: Resolves a variety of issues without physical presence, like software troubleshooting or network problem fixing. 4. **Technical Support (Level 1, 2, and 3):** - Level 1 (L1): Basic support for simple tasks like password resets or account management. - Level 2 (L2): Advanced support for troubleshooting specific software or network problems. - Level 3 (L3): Specialized support for complex issues like software development or hardware failure. 5. **Network Support:** - Definition: Focuses on maintaining an organization's network infrastructure for stability and performance. - Scope: Includes configuring networks, troubleshooting connectivity, managing firewalls, and monitoring performance. 6. **Cloud Support:** - Definition: Support for cloud-based services, infrastructure, and applications like AWS, Microsoft Azure, or Google Cloud. - Scope: Resolves issues related to cloud computing platforms and services. 7. **Cybersecurity Support:** - Definition: Focuses on protecting systems and data from cyber threats like viruses, malware, and ransomware. - Scope: Includes threat detection, firewall setup, data encryption, and security patch implementation. 8. **Database Support:** - Definition: Specialized support for database management systems, covering setup, maintenance 9. **Software Support:** - Definition: Support focused on resolving issues related to specific software applications. Scope: Includes troubleshooting, software installation, configuration, and updates. 10. **End-User Support:** - Definition: Focused on assisting individuals with their daily IT needs, ensuring they have access to the necessary tools and systems to perform their job. Scope: Common tasks include troubleshooting applications, hardware issues
To view or add a comment, sign in
-
🌟🌟 🌟 Remote Role 🌟 🌟 🌟 Role: Cyber Security SME (Azure Cloud) - 10+ Years Location: Chicago, IL- 100% REMOTE ROLE NEED LOCAL Duration: 12 Months MOI: Video Job Description / Skill set Identity and Access Management – Entra ID RBAC, Conditional Access Policies, Active Directory ID, PIM/PAM, Active Directory Connect, AD FS, ID Protection, MFA Security monitoring includes log aggregation/centralization, correlation, and alerting of security events and incidents. Hands-on experience with Azure policy design, policy exemption, compliance and non-compliance dashboard understanding, remediation task for non-compliance. Experience in Cloud adoption framework, well architected framework, security solution design. Expertise in cybersecurity solutions like Microsoft Defender for Cloud, Defender for endpoint, SOC, MDR, SIEM, SOAR, DAM, etc. Knowledge of MS purview, DLP, Insider risk policies etc. Configure rules for real-time alerting in SIEM tool for events, analytic rules, automation rules, hunting queries & Playbook. Knowledge of 3rd party tools CrowdStrike, LogRhythm, Netspoke, semperis, Illumio Participates in the incident response and investigation process. Knows about network architecture and protocols like TCP/IP, HTTP, etc. Security Services - Security Operation Center, Key Vault, Log Analytics, Monitor Apply and implement cloud security technologies. Review existing cloud security measures and processes. Implement security as a core part of all design and development of the client’s cloud solutions. Recommend best practices based on leading industry insights. Map security controls to compliance requirements for cloud environments. Provide incident response support as a key stakeholder. Identify, triage, and remediate security detections and anomalies. Assess vulnerabilities and attacker tactics, techniques, and procedures (TTP) and provide defensive action to locate and prevent threats. Work creatively and analytically in a problem-solving environment.
To view or add a comment, sign in
Client Relationship Manager \US Recruiting\ Sales
4moravindras@arohak.com