Hello
Hope you are doing well!!
We have following positions for you please have a look and let us know if you are interested for the same
Position: M365 Architect
Location: Remote
Duration: 6+ months
Experience :14+ Years
Detailed Job Description:
•The role will involve architecting and estimating security solutions and ensuring they are delivered.
•Deep understanding of M365 Security and Compliance workloads and scenarios including cybersecurity, threat protection, compliance, and incident response.
•Deep understanding of architecture and security management- including security network and enterprise cloud applications
•Understanding of Enterprise Mobility and Security Suite (EM S), Advanced Threat Protection (ATP), Azure Information Protection (AIP) and Intune
•Experience using Azure Key Vault, Azure Security Center, Azure Operations Management Service, Log Analytics
•Able to identity and Access Management principals, including B2B and B2C cloud design and implementation.
•Experience creating security framework, SIRP process, or forensic handling methods.
•Experience implementing cloud security models (identity, network, and governance)
•Deep understanding of Microsoft security technologies
Should have at least 5 years’ experience in below M365 products
•Microsoft Endpoint Manager for Windows 10, iOS, Android and MacOS
•Microsoft Information Protection
•Microsoft 365 Defender
•Microsoft Defender for Endpoint
•Microsoft Defender for Office 365
•Microsoft Defender for Identity
•Office 365 Security
•Windows 10/11 Security
•Microsoft Cloud App Security
•Azure Security, including Azure Sentinel
Please reply with your Consultant Updated Resume in word format, Availability and Expected Compensation
Thanks & Regards
Murali
371 Hoes Lane, Suite # 200-A5 & A6, Piscataway, NJ 08854
Linked ID : linkedin.com/in/muralikrishna-peddigani-3b1987258
Murali@HyreU.com || WWW.HyreU.com
Confidentiality Notice: This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and/or privileged information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message.