Expoint – all jobs in one place
המקום בו המומחים והחברות הטובות ביותר נפגשים
Limitless High-tech career opportunities - Expoint

Microsoft Cloud Solution Architect - Security 
Taiwan, Taoyuan City 
988716042

Yesterday

Securityreporting to the Cloud Solution Architect

In this role you will adapt business models, plans, and solutions to insights. Act as the voice of the customers (VOC)/partners across communities to add and prioritize. Leverages and champions an existing architecture approach to achieve agreed commitments to the customer/partner. Demonstrate and prove solutions capability and value. Apply broad technical knowledge across various architecture solutions to meet requirements and resolve, escalate, and work to resolve technical blockers and route non-technical issues for removal. Adaptnew ideas

Technical Expertise:

At leastyears of experience workingwith customers in any of the following: providing technical readiness and training, delivery of support services, on-premises and remote technical support, solution development, account management, technical requirements gathering.

At leastyears of security related experience with any of the following security domain technologies:

Azure and Cloud Security Engineering

  • Azure Security Infrastructure, Databases, Networking, Virtual Machines
  • Azure Secrets and Keys
  • Azure Identity
  • Troubleshooting of data logging and audit, security monitoring
  • Azure Governance and Compliance
  • Microsoft Defender for Identity
  • Microsoft Defender for Cloud
  • Microsoft Client/Server Operating Systems Security, including related services (egCertificate Authority, authentication/authorization mechanisms, encryption, health attestation)
  • Microsoft Security recommendation experience (egSecuring Privileged Access, Credential Theft Mitigations)
  • Azure Security Services (egAzure Advanced Threat Protection, Azure Information Protection, Azure Security Center, Azure Log Analytics)
  • Security Threat Landscape experience including advanced attack vectors and tools (egPass the Hash, Golden Ticket, ransomware)

Infrastructure Security experience with competitive cloud security technologies, cloud security platforms, or any of the following:

  • Active Directory
  • Azure Active Directory, Entra ID
  • Cloud workload protection
  • Threat protection
  • WAF (Web Application Firewall)
  • firewall. (NG Firewall)
  • Data encryption and protection key services.
  • SIEM, and Cloud Security Analytics
  • Security Orchestration, Automation, and Response (SOAR)
  • Security Operation Center
  • Identity and Access Management

Security

  • Microsoft Defender for Office 365
  • Microsoft Defender for Cloud Apps
  • Microsoft Defender for Endpoint
  • : Data loss prevention (DLP), Information Protection, Insider Risk Management, Privileged Access Management,Data Security Posture Management (DSPM),Compliance:Records Management,Audit /eDiscovery, Data Life Cycle Management
  • Microsoft SharePoint
  • Advanced Hunting
  • Simulation Training
  • Threat Analytics

Modern Management - Mobility and Security Solutions in any of the following:

  • Autopilot, Desktop Analytics, Conditional Access, identity governance, Azure Active Directory (AAD), Microsoft Cloud App Security (MCAS); Advanced Threat Analytics; Microsoft Endpoint Configuration Manager.
  • Microsoft Defender XDR

Endpoint Management Security related technologies:

  • Microsoft Enterprise Mobility Suite + Security (EMS),
  • Active Directory/Identity
  • Windows Defender Advanced Threat Protection (D-ATP)
  • Office 365 Advanced Threat Protection
  • Other endpoint security solutions and comprehensive threat protection technologies.

:

  • +years of total IT experience, withminimum5years of experience in Infrastructure/Cloud Securityrelated profile, experience in designing,deliveringor managing information security services


Any of the below certifications

  • Certification (Any one of the certifications – Minimum)
  • Cybersecurity Architect Certification
  • Security Operations Analyst Associate
  • Identity and Access Administrator Associate
  • Information Protection Administrator Associate
  • Security, Compliance, and Industry Fundamentals

Key responsibilities include:

  • (Insights about Customer/Partner and Industry):Gather customer/partner insights (e.g., feedback around technical preferences, environments, business needs, competitive landscape), and map architecture and digitaltransformation solutions to customer/partner business outcomes. Adapt business models, plans, and solutions to insights
  • (Internal Advocacy):
  • Architecture Design and Deployment(Architecture Proposals):Receive and synthesize data about customer/partner business and technical requirements, address them with technical architecture(s),demonstrate
  • Architecture Design and Deployment(Requirements and Constraints):Applybroad technical knowledge acrossvarious ofarchitecture solutions to meet business and information technology (IT) requirements and resolveidentifiedtechnical constraints.Help to shape and enhance customers' requirements.
  • Architecture Design and Deployment(Resolving Blockers):Identify, escalate, and work to resolve technical blockers (e.g., changing configurations, sample coding) to accelerate architecture implementations and routes non-technical issues for removal by theappropriate party
  • Trusted Advisor(Challenger Mindset):
  • Trusted Advisor(Competitor Insights/ Differentiated Value Proposition):Understand the competitor's architecture solutions andidentify
  • :
  • Deliver positive CustomerSatisfaction, andbecome trusted advisors to customers byleveragingsolution areaexpertise