Experience designing and implementing security for Azure SQL Database, including encryption at rest and in transit, auditing, and Defender for SQL
Proficiency with Azure Active Directory integration, AD security policies, authentication methods (SQL authentication and Azure AD), and RBAC-based access control
Hands-on experience configuring server- and database-level firewall rules, secure connection strings, and managing access across departments
Knowledge of data masking, encryption, and secure authentication/authorization practices and ability to document security controls
Requirements:
Design and implement a security strategy for an internal Azure SQL Database used for Power BI reporting
Configure and manage firewall rules (server and database level), Azure AD administrator, and authentication/authorization mechanisms
Enable and monitor security features such as Defender for SQL, auditing, data masking, encryption, and enforce RBAC-based access controls
Establish AD security policies, conduct access audits, and produce security documentation for compliance
Job description
Job Title :Azure SQL Database consultant with Security Location : Remote Position Type :Contract US Citizen, Green Card,TN, GC EAD and H4 EAD only No Third-party agencies corp to corp. Job Description:
Design and Implement a strategy to secure and protect an Azure SQL database, that will serve as an internal-only reporting database (e.g. so the client can build PowerBI dashboards for various departments such as HRIS, GL, Finance, etc.).
Securing the Azure SQL DB will involve:
Data/Information Protection
Encrypt data at rest and in transit
Secure based on various security contexts and personas (Different for each department)
AD Security and policies
Audit and Logging
As well as other aspects of security, such as:
Create server-level and database-level firewall rules
Configure an Azure Active Directory (Azure AD) administrator
Manage user access with SQL authentication, Azure AD authentication, and secure connection strings
Enable security features, such as Microsoft Defender for SQL, auditing, data masking, and encryption
Limit access using firewall rules
Use authentication mechanisms that require identity
Use authorization with role-based memberships and permissions