#W2_Only 100% REMOTE ROLE. Though locals are preferred but not mandatory. Please share the profiles at karunakar@collaboratesolutions.com #Azure_Cloud_Cyber_Security_SME #Chicago_IL #12_Months Identity and Access Management – Entra ID RBAC, Conditional Access Policies, Active Directory ID, PIM/PAM, Active Directory Connect, AD FS, ID Protection, MFA Security monitoring includes log aggregation/centralization, correlation, and alerting of security events and incidents. Hands-on experience with Azure policy design, policy exemption, compliance and non-compliance dashboard understanding, remediation task for non-compliance. Experience in Cloud adoption framework, well architected framework, security solution design. Expertise in cybersecurity solutions like Microsoft Defender for Cloud, Defender for endpoint, SOC, MDR, SIEM, SOAR, DAM, etc. Knowledge of MS purview, DLP, Insider risk policies etc. Configure rules for real-time alerting in SIEM tool for events, analytic rules, automation rules, hunting queries & Playbook. Knowledge of 3rd party tools CrowdStrike, LogRhythm, Netspoke, semperis, Illumio Participates in the incident response and investigation process. Knows about network architecture and protocols like TCP/IP, HTTP, etc. Security Services - Security Operation Center, Key Vault, Log Analytics, Monitor Apply and implement cloud security technologies. Review existing cloud security measures and processes. Implement security as a core part of all design and development of the client’s cloud solutions. Recommend best practices based on leading industry insights. Map security controls to compliance requirements for cloud environments. Provide incident response support as a key stakeholder. Identify, triage, and remediate security detections and anomalies. Assess vulnerabilities and attacker tactics, techniques, and procedures (TTP) and provide defensive action to locate and prevent threats. Work creatively and analytically in a problem-solving environment.
Karunakar Reddy’s Post
More Relevant Posts
-
100% REMOTE ROLE. Though locals are preferred but not mandatory. Please share the profiles at karunakar@collaboratesolutions.com / joshua@collaboratesolutions.com #Azure_Cloud_Cyber_Security_SME #Chicago_IL #12_Months Identity and Access Management – Entra ID RBAC, Conditional Access Policies, Active Directory ID, PIM/PAM, Active Directory Connect, AD FS, ID Protection, MFA Security monitoring includes log aggregation/centralization, correlation, and alerting of security events and incidents. Hands-on experience with Azure policy design, policy exemption, compliance and non-compliance dashboard understanding, remediation task for non-compliance. Experience in Cloud adoption framework, well architected framework, security solution design. Expertise in cybersecurity solutions like Microsoft Defender for Cloud, Defender for endpoint, SOC, MDR, SIEM, SOAR, DAM, etc. Knowledge of MS purview, DLP, Insider risk policies etc. Configure rules for real-time alerting in SIEM tool for events, analytic rules, automation rules, hunting queries & Playbook. Knowledge of 3rd party tools CrowdStrike, LogRhythm, Netspoke, semperis, Illumio Participates in the incident response and investigation process. Knows about network architecture and protocols like TCP/IP, HTTP, etc. Security Services - Security Operation Center, Key Vault, Log Analytics, Monitor Apply and implement cloud security technologies. Review existing cloud security measures and processes. Implement security as a core part of all design and development of the client’s cloud solutions. Recommend best practices based on leading industry insights. Map security controls to compliance requirements for cloud environments. Provide incident response support as a key stakeholder. Identify, triage, and remediate security detections and anomalies. Assess vulnerabilities and attacker tactics, techniques, and procedures (TTP) and provide defensive action to locate and prevent threats. Work creatively and analytically in a problem-solving environment.
To view or add a comment, sign in
-
Hello Professionals, Its a W2 role. 100% REMOTE ROLE. Though locals are preferred but not mandatory. Position: Azure Cloud Cyber Security SME- Location: Chicago, IL Duration: 12 Months experience: 8+ years Visa: any visa except OPT and CPT Identity and Access Management – Entra ID RBAC, Conditional Access Policies, Active Directory ID, PIM/PAM, Active Directory Connect, AD FS, ID Protection, MFA Security monitoring includes log aggregation/centralization, correlation, and alerting of security events and incidents. Hands-on experience with Azure policy design, policy exemption, compliance and non-compliance dashboard understanding, remediation task for non-compliance. Experience in Cloud adoption framework, well architected framework, security solution design. Expertise in cybersecurity solutions like Microsoft Defender for Cloud, Defender for endpoint, SOC, MDR, SIEM, SOAR, DAM, etc. Knowledge of MS purview, DLP, Insider risk policies etc. Configure rules for real-time alerting in SIEM tool for events, analytic rules, automation rules, hunting queries & Playbook. Knowledge of 3rd party tools CrowdStrike, LogRhythm, Netspoke, semperis, Illumio Participates in the incident response and investigation process. Knows about network architecture and protocols like TCP/IP, HTTP, etc. Security Services - Security Operation Center, Key Vault, Log Analytics, Monitor Apply and implement cloud security technologies. Review existing cloud security measures and processes. Implement security as a core part of all design and development of the client’s cloud solutions. Recommend best practices based on leading industry insights. Map security controls to compliance requirements for cloud environments. Provide incident response support as a key stakeholder. Identify, triage, and remediate security detections and anomalies. Assess vulnerabilities and attacker tactics, techniques, and procedures (TTP) and provide defensive action to locate and prevent threats. Work creatively and analytically in a problem-solving environment.
To view or add a comment, sign in
-
🌟🌟 🌟 Remote Role 🌟 🌟 🌟 Role: Cyber Security SME (Azure Cloud) - 10+ Years Location: Chicago, IL- 100% REMOTE ROLE NEED LOCAL Duration: 12 Months MOI: Video Job Description / Skill set Identity and Access Management – Entra ID RBAC, Conditional Access Policies, Active Directory ID, PIM/PAM, Active Directory Connect, AD FS, ID Protection, MFA Security monitoring includes log aggregation/centralization, correlation, and alerting of security events and incidents. Hands-on experience with Azure policy design, policy exemption, compliance and non-compliance dashboard understanding, remediation task for non-compliance. Experience in Cloud adoption framework, well architected framework, security solution design. Expertise in cybersecurity solutions like Microsoft Defender for Cloud, Defender for endpoint, SOC, MDR, SIEM, SOAR, DAM, etc. Knowledge of MS purview, DLP, Insider risk policies etc. Configure rules for real-time alerting in SIEM tool for events, analytic rules, automation rules, hunting queries & Playbook. Knowledge of 3rd party tools CrowdStrike, LogRhythm, Netspoke, semperis, Illumio Participates in the incident response and investigation process. Knows about network architecture and protocols like TCP/IP, HTTP, etc. Security Services - Security Operation Center, Key Vault, Log Analytics, Monitor Apply and implement cloud security technologies. Review existing cloud security measures and processes. Implement security as a core part of all design and development of the client’s cloud solutions. Recommend best practices based on leading industry insights. Map security controls to compliance requirements for cloud environments. Provide incident response support as a key stakeholder. Identify, triage, and remediate security detections and anomalies. Assess vulnerabilities and attacker tactics, techniques, and procedures (TTP) and provide defensive action to locate and prevent threats. Work creatively and analytically in a problem-solving environment.
To view or add a comment, sign in
-
#hiring Position: Azure Cloud Cyber Security SME- Location: Chicago, IL (Remote) Identity and Access Management – Entra ID RBAC, Conditional Access Policies, Active Directory ID, PIM/PAM, Active Directory Connect, AD FS, ID Protection, MFA Security monitoring includes log aggregation/centralization, correlation, and alerting of security events and incidents. Hands-on experience with Azure policy design, policy exemption, compliance and non-compliance dashboard understanding, remediation task for non-compliance. Experience in Cloud adoption framework, well architected framework, security solution design. Expertise in cybersecurity solutions like Microsoft Defender for Cloud, Defender for endpoint, SOC, MDR, SIEM, SOAR, DAM, etc. Knowledge of MS purview, DLP, Insider risk policies etc. Configure rules for real-time alerting in SIEM tool for events, analytic rules, automation rules, hunting queries & Playbook. Knowledge of 3rd party tools CrowdStrike, LogRhythm, Netspoke, semperis, Illumio Participates in the incident response and investigation process. Knows about network architecture and protocols like TCP/IP, HTTP, etc. Security Services - Security Operation Center, Key Vault, Log Analytics, Monitor Apply and implement cloud security technologies. Review existing cloud security measures and processes. Implement security as a core part of all design and development of the client’s cloud solutions. Recommend best practices based on leading industry insights. Map security controls to compliance requirements for cloud environments. Provide incident response support as a key stakeholder. Identify, triage, and remediate security detections and anomalies. Assess vulnerabilities and attacker tactics, techniques, and procedures (TTP) and provide defensive action to locate and prevent threats. Work creatively and analytically in a problem-solving environment. send resume to sarathchandra.maddukuri@valueprosite.org
To view or add a comment, sign in
-
100% REMOTE ROLE. Though locals are preferred but not mandatory. Position: Azure Cloud Cyber Security SME- Location: Chicago, IL Duration: 12 Months Identity and Access Management – Entra ID RBAC, Conditional Access Policies, Active Directory ID, PIM/PAM, Active Directory Connect, AD FS, ID Protection, MFA Security monitoring includes log aggregation/centralization, correlation, and alerting of security events and incidents. Hands-on experience with Azure policy design, policy exemption, compliance and non-compliance dashboard understanding, remediation task for non-compliance. Experience in Cloud adoption framework, well architected framework, security solution design. Expertise in cybersecurity solutions like Microsoft Defender for Cloud, Defender for endpoint, SOC, MDR, SIEM, SOAR, DAM, etc. Knowledge of MS purview, DLP, Insider risk policies etc. Configure rules for real-time alerting in SIEM tool for events, analytic rules, automation rules, hunting queries & Playbook. Knowledge of 3rd party tools CrowdStrike, LogRhythm, Netspoke, semperis, Illumio Participates in the incident response and investigation process. Knows about network architecture and protocols like TCP/IP, HTTP, etc. Security Services - Security Operation Center, Key Vault, Log Analytics, Monitor Apply and implement cloud security technologies. Review existing cloud security measures and processes. Implement security as a core part of all design and development of the client’s cloud solutions. Recommend best practices based on leading industry insights. Map security controls to compliance requirements for cloud environments. Provide incident response support as a key stakeholder. Identify, triage, and remediate security detections and anomalies. Assess vulnerabilities and attacker tactics, techniques, and procedures (TTP) and provide defensive action to locate and prevent threats. Work creatively and analytically in a problem-solving environment.
To view or add a comment, sign in
-
100% REMOTE ROLE. Though locals are preferred but not mandatory. Position: Azure Cloud Cyber Security SME- Location: Chicago, IL Duration: 12 Months Identity and Access Management – Entra ID RBAC, Conditional Access Policies, Active Directory ID, PIM/PAM, Active Directory Connect, AD FS, ID Protection, MFA Security monitoring includes log aggregation/centralization, correlation, and alerting of security events and incidents. Hands-on experience with Azure policy design, policy exemption, compliance and non-compliance dashboard understanding, remediation task for non-compliance. Experience in Cloud adoption framework, well architected framework, security solution design. Expertise in cybersecurity solutions like Microsoft Defender for Cloud, Defender for endpoint, SOC, MDR, SIEM, SOAR, DAM, etc. Knowledge of MS purview, DLP, Insider risk policies etc. Configure rules for real-time alerting in SIEM tool for events, analytic rules, automation rules, hunting queries & Playbook. Knowledge of 3rd party tools CrowdStrike, LogRhythm, Netspoke, semperis, Illumio Participates in the incident response and investigation process. Knows about network architecture and protocols like TCP/IP, HTTP, etc. Security Services - Security Operation Center, Key Vault, Log Analytics, Monitor Apply and implement cloud security technologies. Review existing cloud security measures and processes. Implement security as a core part of all design and development of the client’s cloud solutions. Recommend best practices based on leading industry insights. Map security controls to compliance requirements for cloud environments. Provide incident response support as a key stakeholder. Identify, triage, and remediate security detections and anomalies. Assess vulnerabilities and attacker tactics, techniques, and procedures (TTP) and provide defensive action to locate and prevent threats. Work creatively and analytically in a problem-solving environment.
To view or add a comment, sign in
-
100% REMOTE ROLE. Though locals are preferred but not mandatory. Position: Azure Cloud Cyber Security SME- Location: Chicago, IL Duration: 12 Months Rate: . on w2. Identity and Access Management – Entra ID RBAC, Conditional Access Policies, Active Directory ID, PIM/PAM, Active Directory Connect, AD FS, ID Protection, MFA Security monitoring includes log aggregation/centralization, correlation, and alerting of security events and incidents. Hands-on experience with Azure policy design, policy exemption, compliance and non-compliance dashboard understanding, remediation task for non-compliance. Experience in Cloud adoption framework, well architected framework, security solution design. Expertise in cybersecurity solutions like Microsoft Defender for Cloud, Defender for endpoint, SOC, MDR, SIEM, SOAR, DAM, etc. Knowledge of MS purview, DLP, Insider risk policies etc. Configure rules for real-time alerting in SIEM tool for events, analytic rules, automation rules, hunting queries & Playbook. Knowledge of 3rd party tools CrowdStrike, LogRhythm, Netspoke, semperis, Illumio Participates in the incident response and investigation process. Knows about network architecture and protocols like TCP/IP, HTTP, etc. Security Services - Security Operation Center, Key Vault, Log Analytics, Monitor Apply and implement cloud security technologies. Review existing cloud security measures and processes. Implement security as a core part of all design and development of the client’s cloud solutions. Recommend best practices based on leading industry insights. Map security controls to compliance requirements for cloud environments. Provide incident response support as a key stakeholder. Identify, triage, and remediate security detections and anomalies. Assess vulnerabilities and attacker tactics, techniques, and procedures (TTP) and provide defensive action to locate and prevent threats. Work creatively and analytically in a problem-solving environment.
To view or add a comment, sign in
-
Some real Insider threats we detected and prevented in Australia in just the last 1 year. Sometimes the biggest risk to your company is not some overseas guy in a hoodie but the one sitting next to you. We will be uploading these case studies on our website soon. #insiderthreats #userrisk #humanrisk
Hi I recently reviewed our recent results in respect to the GuardWare Insider Threat Assessments we conduct. To my dismay I realised just how understated this threat actually is in corporate risk assessments. Of course I cannot share company names or individual details and some of these come from Assessment reports where we have not yet closed the next step to a sale (incredulously when you think about it). But the titles are enough to point out what is happening : 1. Malicious Event – Personal USB vs Company USB 2. SharePoint → Malicious mass downloads from Sensitive Folder to user’s personal device. 3. SharePoint → Exposure of Customer Data by Law firm – Human Error 4. Stored Passwords detected by INSIGHT by Company’s MSP having admin rights. 5. Scans revealed stored Customer data including bank account info in AWS DevOPs environment. 6. Outsource Developers of a financial institution detected exposing Financial APPs source code and company’s IP. 7. Productivity drop in WFH scenarios compared with Office 8. Rogue Network in Protected Level Network 9. Malicious use of personal Cloud Storage Services and Website Transfers 10. Corporate Email Risk → Email forward to user’s Personal Email resulted in serious theft of sensitive PII data 11. WFH Risks – Misue of VPN detected 12. Malicious Insider in a Recruitment Firm – Data exfil by a Director Why would you not, as a senior manager or board member, seek a risk assessment at the very least? Then have some 24/7/365 protection at very low cost. Alan
To view or add a comment, sign in
-
In today’s fast-evolving digital landscape, maintaining and updating software isn’t just a technical necessity; it’s a strategic investment in your cybersecurity and operational efficiency. 🚀 You might wonder, why bother when you’ve already paid for a license and the development of features? Shouldn’t they work indefinitely? Here are two compelling reasons to reconsider: 1. Cybersecurity Risks: Software that isn’t updated becomes a playground for hackers. The cost of a breach, both financially and to your reputation, can be astronomical. 🛡️ 2. Outdated Software Costs More: Delaying updates means paying a premium later, in terms of both the technology and the increasingly rare skills required to manage legacy systems. Have you ever tried hiring a Mainframe Engineer recently, or updating Cloudcraze through most Salesforce partners? It’s not just challenging; it’s costly. 💸 Proactive maintenance trumps reactive panic, every time. And the good news? You don’t have to break the bank or hire a full-time consultant to stay ahead. Forte DGTL offers a monthly subscription that ensures your systems are up-to-date, secure, and even periodically enhanced with new features. You get an entire team for a fraction of the cost of a full-time employee. Clients observed a significant uptick in businesses, both pre-and post-go-live, switching to such solutions for peace of mind and operational efficiency. 🌟 If simplifying your maintenance and securing your operations sounds like a plan, let’s connect. I’m here to help you navigate these challenges effortlessly. #Cybersecurity #SoftwareMaintenance #Salesforce #OperationalEfficiency #DigitalTransformation #ManagedService #ForteDGTL
To view or add a comment, sign in
Information Security Analyst @ ValueLabs | SOC Analyst |Azure Sentinel |Splunk| IBM Qradar|MS Defender|CrowdStrike|SentinelOne|ServiceNow|PaloAlto Panorama|MS O365|CompTIA CySA+
4mo#interested