Apply

Principal Consultant – Microsoft Defender/Intune | Remote, USA

Posted 1 day agoViewed

View full description

💎 Seniority level: Principal, 10-15 years

📍 Location: United States

🔍 Industry: Software Development

🏢 Company: Optiv_Careers

🗣️ Languages: English

⏳ Experience: 10-15 years

🪄 Skills: Cloud ComputingCybersecurityMicrosoft Active DirectoryMicrosoft AzureCommunication SkillsAnalytical SkillsPresentation skillsComplianceNetworkingRisk ManagementScripting

Requirements:
  • Expertise with implementation, administration, and maturation of Endpoint Detection and Response (EDR) Mobile Device Management (MDM) and Application Control technologies
  • Primary Expertise with Microsoft Defender and Intune (Microsoft On-Prem Services and Cloud Services)
  • Experience with CrowdStrike, SentinelOne, Tanium
  • Very knowledgeable of multiple security concepts and methods such as vulnerability assessments, data classification, privacy assessments, incident response, security policy creation, enterprise security strategies, architectures and governance.
  • Strong understanding of networking (TCP/IP, OSI model), operating system fundamentals (Windows, UNIX, mainframe), security technologies (firewalls, IDS/IPS, etc.) and application programming/scripting languages (C, Java, Perl, Shell).
  • Strong understanding of regulatory requirements and compliance issues affecting clients related to privacy and data protection, such as PCI DSS, GLBA, Basel II, EU Data Protection Directive, International Cross Border, and U.S. State Data Privacy Laws.
  • Technical architecture experience integrating data protection software into clients' infrastructure; network architecture design, implementation and administration.
Responsibilities:
  • Work with customers to help them articulate their business requirements and how those requirements translate into security features and functionality.
  • Architect solutions to ensure that the customer's risk transformation requirements are met.
  • Assist with development of cyber engagement plans for customers which will enable them to execute upon strategies.
  • Rationalize different security solutions against requirements, risk, and constraints.
  • Undertake Threat, Vulnerability and Risk analysis methodologies/techniques and the interpretation/application of their output in the definition of Security Architectures.
  • Able to deliver and lead other consultants in complex projects
  • Able to present to large groups. Speaks as an authority.
  • Can handle difficult questions and consistently wins support from client audiences.
Apply