Security SMEs will work with client security team and other project workstreams to define, document and assist with configuration of applicable Security controls for a Dynamics 365 ERP implementation. The Security Architect will lead this effort, providing direction to the offshore SME. The following activities will be in scope for the security workstream:
Conduct up to six (6) workshops/ interviews with appropriate client security stakeholders with a focus on business and Security requirements, Identity and Access Management, Data Protection and Security monitoring. Workshops will cover the following:
Business and Security Requirements
Review of Policies, Procedures, Standards & Guidelines
Discuss Data Encryption/ Tokenization/ Masking/ Anonymization
Security Monitoring
Discuss Security Logging
Discuss SIEM Integration Design
\nThis offer from \"J&M Group\" has been enriched by Jobgether.com and got a 67% flex score.","identifier":{"@type":"PropertyValue","name":"J&M Group","value":"646f548214d0992a2df7906e"},"hiringOrganization":{"@type":"Organization","name":"J&M Group","sameAs":"","logo":"https://cdn-s3.jobgether.com/enterprise_unknow.png"},"datePosted":"2025-06-03T14:33:53.278Z","employmentType":["CONTRACTOR"],"applicantLocationRequirements":[{"@type":"Country","name":"CA"}],"jobLocation":[{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":"Toronto","addressCountry":"CA"}}],"validThrough":"2026-05-29T14:37:22.415Z"}
Help us maintain the quality of our job listings. If you find any issues with this job post, please let us know.
Select the reason you're reporting this job:
Security SMEs will work with client security team and other project workstreams to define, document and assist with configuration of applicable Security controls for a Dynamics 365 ERP implementation. The Security Architect will lead this effort, providing direction to the offshore SME. The following activities will be in scope for the security workstream:
Conduct up to six (6) workshops/ interviews with appropriate client security stakeholders with a focus on business and Security requirements, Identity and Access Management, Data Protection and Security monitoring. Workshops will cover the following:
Business and Security Requirements
Review of Policies, Procedures, Standards & Guidelines