Logo for Workiy Inc.

Security Assessment

Key Facts

Remote From: 
Fixed term
English

Hard Skills

Other Skills

  • •
    Governance
  • •
    Collaboration
  • •
    Communication
  • •
    Analytical Skills
  • •
    Report Writing
  • •
    Problem Solving

Roles & Responsibilities

  • Experience conducting internal and external vulnerability assessments and penetration testing, including real-world attack simulations.
  • Strong background in IT infrastructure assessment across data center, cloud (Azure), network, and endpoint management to identify risks and optimization opportunities.
  • Deep knowledge of identity security (Active Directory, Microsoft Entra ID), authentication weaknesses, MFA/Conditional Access, privileged access risks.
  • Experience with endpoint management using Microsoft Intune, including device enrollment, configuration policies, patch management, and security baseline hardening.

Requirements:

  • Conduct internal and external vulnerability assessments and penetration testing, including real-world attack simulations; identify risks (unpatched systems, misconfigurations, weak services); provide risk ratings, exploit validation, and remediation recommendations; deliver Security Assessment Report + Executive Summary.
  • Perform Identity Infrastructure Assessment (Active Directory and Microsoft Entra ID) covering architecture review, configuration quality, replication health, DNS, Group Policy, hybrid identity, directory synchronization, authentication weaknesses, MFA/Conditional Access, privileged access risks, account audits, provisioning/deprovisioning, SSO integration, and self-service password reset; deliver Identity Assessment Report + Executive Summary.
  • Assess IT Infrastructure (data center, Azure, network, client devices) and provide an optimization roadmap with modernization opportunities and cost sustainability recommendations; deliver Infrastructure Assessment Report + Roadmap + Executive Summary.
  • Optimize Endpoint Management (Intune): review device enrollment, configuration policies, compliance, Entra ID integration, conditional access, device lifecycle, hardening, deployment strategies, and provide an optimization plan and implementation guidance; deliver Endpoint Management Assessment Report + Executive Summary.

Job description

This is a remote position.

Project Description:

  • Provide IT consulting and professional services to support IMIT Organizational Review and multi-year technology roadmap.
  • Assess current-state IT environment across security, identity, infrastructure, and endpoint management.
  • Identify:
    • Risks and vulnerabilities
    • Control gaps
    • Optimization opportunities
  • Deliver assessment reports with recommendations for modernization, governance, and investment planning.
  • Support improvement in:
    • Security posture
    • Operational efficiency
    • Service delivery
    • User experience
  • Engagement includes multiple workstreams each focusing on a specific domain.

 

 


Requirements

Role 1: Security Assessment & Penetration Testing

Responsibilities

  • Conduct internal & external vulnerability assessments
  • Perform penetration testing (real-world attack simulations)
  • Identify:
    • Unpatched systems
    • Misconfigurations
    • Weak/exposed services
  • Execute:
    • Network perimeter analysis
    • Port scanning & service enumeration
    • Internal network discovery & mapping
  • Perform:
    • Credential-based attacks
    • Privilege escalation & lateral movement testing
  • Test web applications (e.g., XSS, injection vulnerabilities)
  • Assess:
    • Identity-related risks
    • Trust relationships
  • Identify data exposure risks (files, databases, storage)
  • Provide:
    • Risk severity ratings
    • Exploit validation
    • Remediation recommendations
  • Deliver Security Assessment Report + Executive Summary

 

Role 2: Identity Infrastructure Assessment (Active Directory & Entra ID)

Responsibilities

  • Review Active Directory & Microsoft Entra ID architecture
  • Assess:
    • Configuration quality
    • Replication health
    • DNS & Group Policy setup
  • Evaluate:
    • Hybrid identity setup
    • Directory synchronization
  • Conduct Identity Security Assessment:
    • Authentication weaknesses
    • MFA & Conditional Access
    • Privileged access risks
  • Perform Account & Privilege Audit:
    • Stale/orphaned accounts
    • Service accounts
    • Role assignments
  • Analyze:
    • Privilege escalation paths
    • Attack paths
  • Review:
    • Provisioning & deprovisioning processes
    • SSO integration (e.g., MyEdBC)
    • Self-service password reset
  • Recommend:
    • Identity governance improvements
    • Automation & lifecycle management
  • Deliver Identity Assessment Report + Executive Summary

 

Role 3: IT Infrastructure Assessment & Optimization

Responsibilities

  • Review data centre infrastructure:
    • Servers, storage, virtualization
    • Backup & disaster recovery
  • Assess Microsoft Azure environment:
    • Tenant design & governance
    • Cost optimization
    • Hybrid integration
  • Evaluate network infrastructure:
    • WAN/LAN design
    • Wireless & firewall setup
    • Segmentation & IP structure
  • Review client infrastructure:
    • Device lifecycle
    • Patch management
    • Support models
  • Analyze:
    • Operational practices
    • Service delivery efficiency
  • Conduct:
    • Stakeholder interviews
    • Workshops & site visits
  • Identify:
    • Risks & performance gaps
    • Modernization opportunities
  • Provide:
    • Optimization roadmap (good/better/best)
    • Cost & sustainability recommendations
  • Deliver Infrastructure Assessment Report + Roadmap + Executive Summary

 

Role 4: Endpoint Management (Intune) Optimization

Responsibilities

  • Review Microsoft Intune architecture & configuration
  • Assess:
    • Device enrollment & provisioning
    • Configuration profiles & policies
  • Evaluate:
    • Compliance & security policies
    • Patch/update management
  • Review identity integration:
    • Entra ID integration
    • Conditional Access
  • Analyze:
    • Device lifecycle management
    • Remote management capabilities
  • Assess endpoint security configuration:
    • Baselines & hardening practices
  • Review application management:
    • Deployment strategies
    • Legacy applications
  • Evaluate network integration:
    • Wi-Fi authentication
    • VPN & certificate-based access
  • Identify:
    • Configuration gaps
    • Operational inefficiencies
  • Provide:
    • Optimization plan
    • Implementation guidance
  • Deliver Endpoint Management Assessment Report + Executive Summary

 



Related jobs

Other jobs at Workiy Inc.

We help you get seen. Not ignored.

We help you get seen faster — by the right people.

🚀

Auto-Apply

We apply for you — automatically and instantly.

Save time, skip forms, and stay on top of every opportunity. Because you can't get seen if you're not in the race.

✨

AI Match Feedback

Know your real match before you apply.

Get a detailed AI assessment of your profile against each job posting. Because getting seen starts with passing the filters.

Upgrade to Premium. Apply smarter and get noticed.

Upgrade to Premium

Join thousands of professionals who got noticed and hired faster.