Unified Information Protection Engineer

About the Role Avanade security team members collaborate on the development of information security architecture and ensure technology initiatives are implemented to make our client’s cloud environments more secure.

Members in this role are accountable for securing enterprise information by identifying network, application and device security requirements, then planning, implementing and testing security controls and procedures.

You will leverage your background in device management, data security and mobility to create enterprise grade guardrails for cloud native and private cloud environments.

Day to day, you will:
· Work closely with enterprise architects to identify and mitigate risks, perform security reviews, design premier security practices, and deliver strategic, innovative cloud-based security offerings
· Identify relevant mobile attack vectors and methods to attenuate for our clients
· Perform deep analysis and develop metrics that will measure current risk
· Identify appropriate technology/data sources and drive the collection of data necessary to effectively evaluate threats
· Configure and manage security using tools such as Microsoft Intune, Microsoft EMS, Better, Lookout, MobileIron, Symantec, Airwatch The ideal team member will have a solid foundation across Microsoft technology stack and Azure security offerings.

You will articulate security and risk-related concepts to key stakeholders using your experience and willingness to learn the following:
· Data-focused threat modeling and Mobile Threat Defense (MTD) products
· Cloud Application Security Brokers (CASB) such as Microsoft MCAS
· Unified Endpoint Management (UEM)
· Azure Security (Azure Key Vault, Azure Defender, Azure Sentinel, Log Analytics)
· Architecture and security design across mobile data classifications
· Security complements for unstructured data, artificial intelligence, and machine learning
· Solid grasp of security encryption methodologies
· Knowledge of host hardening, auditing, logging and monitoring, network security, SIEM deployments, security analytics, anomaly detections, PKI
· Proven implementation of cloud security models, particularly identity, network, and encryption
· Business case development skills for justifying, prioritizing & forecasting the funding requirements for security programs and initiatives Your certifications may include: CISSP, CCSP, CGEIT, S-DPP, Symantec 250-438 To supplement the technical knowledge and project delivery experience, successful candidates will come from a consulting background with good customer facing skills, the ability to capture customer requirements and produce high quality written work.

You likely have a bachelor’s degree in computer science, computer engineering, management information systems, information technology, or a similar field.

An equivalent combination of education and experience may substitute for a degree.

Related Post