Experience designing and implementing security strategies for Azure SQL Database, including encryption at rest and in transit, data masking, and auditing
Proficiency with Azure Active Directory integration, AD security policies, and access management (RBAC) for Azure resources
Knowledge of security features such as Microsoft Defender for SQL, firewall rules (server and database level), auditing, and secure connection strings
Ability to manage authentication methods (SQL authentication and Azure AD authentication) and enforce strict access controls for reporting databases
Requirements:
Design and implement a security strategy for an Azure SQL Database used as an internal-only reporting database (e.g., for Power BI dashboards) across departments
Configure security controls including encryption, auditing, Defender for SQL, data masking, and firewall rules at server and database levels
Manage authentication and authorization using SQL and Azure AD authentication, secure connection strings, and role-based access control
Enforce AD security policies, monitor logs, and ensure ongoing security governance and compliance
Job description
Hi
Azure SQL Database consultant with Security Location; Remote
Design and Implement a strategy to secure and protect an Azure SQL database , that will serve as an internal-only reporting database (e.g. so the client can build PowerBI dashboards for various departments such as HRIS, GL, Finance, etc.).
Securing the Azure SQL DB will involve:
Data/Information Protection
Encrypt data at rest and in transit
Secure based on various security contexts and personas (Different for each department)
AD Security and policies
Audit and Logging
As well as other aspects of security, such as:
Create server-level and database-level firewall rules
Configure an Azure Active Directory (Azure AD) administrator
Manage user access with SQL authentication, Azure AD authentication, and secure connection strings
Enable security features, such as Microsoft Defender for SQL, auditing, data masking, and encryption
Limit access using firewall rules
Use authentication mechanisms that require identity
Use authorization with role-based memberships and permissions