Extensive experience with Azure Cloud security and Identity and Access Management (Entra ID, RBAC, Conditional Access, MFA, PIM/PAM, Active Directory, AD Connect, AD FS)
Proficiency in cloud governance and compliance (Azure Policy design, policy exemptions, compliance dashboards, remediation for non-compliance; Cloud Adoption Framework; Well-Architected Framework)
Expertise with security tooling and platforms (Microsoft Defender for Cloud, Defender for Endpoint, Purview, DLP; familiarity with third-party tools such as CrowdStrike, LogRhythm, Netspoke, Semperis, Illumio) and incident response support
Requirements:
Implement and manage Entra ID identity and access controls including RBAC, Conditional Access, MFA, and PIM/PAM, plus AD components (AD Connect/AD FS)
Monitor security operations: log aggregation, correlation, alerting, and incident response; configure and maintain SIEM/SOAR rules and SOC workflows
Design and enforce cloud security architecture and governance: Azure Policy design, remediation for non-compliance, and alignment with Cloud Adoption Framework and Well-Architected Framework
Leverage security solutions and tools to detect, triage, and remediate threats; support incident response and map security controls to compliance requirements
Job description
Azure Cloud Cyber Security SME – 100% Remote Location: Chicago, IL Duration: 12 Months Rate: DOE
Job Description
Identity and Access Management – Entra ID RBAC, Conditional Access Policies, Active Directory ID, PIM/PAM, Active Directory Connect, AD FS, ID Protection, MFA
Security monitoring includes log aggregation/centralization, correlation, and alerting of security events and incidents.
Hands-on experience with Azure policy design, policy exemption, compliance and non-compliance dashboard understanding, remediation task for non-compliance.
Experience in Cloud adoption framework, well architected framework, security solution design.
Expertise in cybersecurity solutions like Microsoft Defender for Cloud, Defender for endpoint, SOC, MDR, SIEM, SOAR, DAM, etc.
Knowledge of MS purview, DLP, Insider risk policies etc.
Configure rules for real-time alerting in SIEM tool for events, analytic rules, automation rules, hunting queries & Playbook.
Knowledge of 3 rd party tools CrowdStrike, LogRhythm, Netspoke, semperis, Illumio
Participates in the incident response and investigation process.
Knows about network architecture and protocols like TCP/IP, HTTP, etc.