Company Description
Vanator RPO is a one-stop solution provider for Recruitment, Virtual Administrative, and Digital process outsourcing. The company specializes in improving processes and training recruiters, admin executives, and Digital Marketers to enhance virtual recruitment, admin support, and digital assistance. Vanator forms strategic partnerships with clients, offering increased flexibility, scalability, and performance through a combination of human touch and progressive technology.
Role Description
This is a W2 Contract Only remote role for an Azure Cloud Cyber Security Subject Matter Expert (SME). The SME will be responsible for day-to-day tasks such as application security, cybersecurity, network security, information security, and implementing cyber solutions to protect digital assets.
Qualifications
- Identity and Access Management – Entra ID RBAC, Conditional Access Policies, Active Directory ID, PIM/PAM, Active Directory Connect, AD FS, ID Protection, MFA
- Security monitoring includes log aggregation/centralization, correlation, and alerting of security events and incidents.
- Hands-on experience with Azure policy design, policy exemption, compliance and non-compliance dashboard understanding, and remediation tasks for non-compliance.
- Experience in Cloud adoption framework, well-architected framework, and security solution design.
- Expertise in cybersecurity solutions like Microsoft Defender for Cloud, Defender for Endpoint, SOC, MDR, SIEM, SOAR, DAM, etc.
- Knowledge of MS purview, DLP, Insider risk policies, etc.
- Configure rules for real-time alerting in the SIEM tool for events, analytic rules, automation rules, hunting queries & Playbook.
- Knowledge of 3rd party tools CrowdStrike, LogRhythm, Netspoke, empires, Illumio
- Participates in the incident response and investigation process.
- Knows about network architecture and protocols like TCP/IP, HTTP, etc.
- Security Services - Security Operation Center, Key Vault, Log Analytics, Monitor
- Apply and implement cloud security technologies.
- Review existing cloud security measures and processes.
- Implement security as a core part of all design and development of the client’s cloud solutions.
- Recommend best practices based on leading industry insights.
- Map security controls to compliance requirements for cloud environments.
- Provide incident response support as a key stakeholder.
- Identify, triage, and remediate security detections and anomalies.
- Assess vulnerabilities and attacker tactics, techniques, and procedures (TTP) and provide defensive action to locate and prevent threats.
- Work creatively and analytically in a problem-solving environment.