Expoint - all jobs in one place

The point where experts and best companies meet

Limitless High-tech career opportunities - Expoint

Microsoft Cloud Solution Architect - Data Security 
Israel, Tel Aviv District 
124470390

10.09.2024

to secure their entire data estates against internal and external data risk. Microsoft Purview’s integrated Data Security services support customers holistically secure data:

  • Protect Sensitive Data using data classification, sensitivity labelling and encryption policies.
  • Manage Insider Risks using machine learning detection controls and indicators, adaptive protection to dynamically enforce controls and advanced privacy controls
  • servicesand endpoints.

and optimization. You will typically work within small “pod” teams and have access to a significant library of training,and usage guide resources.

Required Qualifications

  • 3+ years’ experience in Data Security / Information SecurityManagement, orrelated field
  • 3+ years of working in cloud infrastructure, IT consulting/support, systems administration,architectureand/or software development.
  • Good understanding of the principles of Data Security, such as data classification, encryption, sensitivity labelling, information protection policies and exfiltration controls
  • Experience in the implementation (end to end) of Data Security projects with Data Security Platforms, preferably experience with Microsoft Purview (Information Protection, Data Loss Prevention, Information Risk Management)
  • Azuredata services such asSharepoint


Preferred Qualifications

  • Bachelor’s Degree in Information Management, or related field and 5+ years’ experience in Data / Information Management.
  • Ability to lead strategic customer conversations to educate and guide development of Data Security requirements.
  • Ability to lead strategic customer conversations to develop Data Security Frameworks and solution architecture design.
  • Experience in Content Services
  • Microsoft Information Protection AdministratorCertification by Microsoft
  • Programming experiences, usingMicrosoft Information Protection SDK
  • technical Certification in Microsoft 365 and other Cloud technologies (e.g., Azure, Amazon Web Services, Google, security certifications).
  • Experience with Public Key Infrastructure in terms of key management and hierarchy.
  • and evaluatessecuritytrends,gathers customer insights (e.g., feedback around technical preferences, environments, business needs, competitive landscape), and maps architecture and digital transformation solutions to customer’s
  • by driving new feedback, insights, and resources to add and prioritize;connecting
  • CISOs,security practitioners, C-level technical decision makers (TDMs), and business stakeholders
  • Uncovers, aggregates, and synthesizes data aboutcustomer’s security postureand roadmap, complex technical requirements and issuesand various technical strategies being proposed.
  • Actively listens, creates, and sustains constructive tension and trust with customers by respectfully challenging their decisions and/or areas where they might do more and encouraging them to consider alternative architectures/solutions and approaches.
  • securityrequirements/issues/strategies with win-win technical architecture(s) anddemonstratesand proves the capability and value of those solutions through design collaboration sessions with the customer.
  • Supports customer skilling by leading discussions on technical delivery with other internal and external stakeholders as a technical thought leader to influence customer readiness.
  • andsharesbest practices
  • operatingandoptimizingcomplex and high-impact situations for strategic customers in collaboration with internal stakeholders (e.g.,STU,CSAM
  • securityrisks, and adaptsmethodology(e.g. Zero Trust, Security Adoption Framework, SFI)and applies governance toidentify, communicate, and minimize business andsecurity
  • Leverages standard tools to ensureaccurate
  • anticipate,identify, propose resolution, and lead removal of technical blockers through regularsecurityreviews and check-ins to accelerate consumption andusage
  • Proactively uses deep knowledge of thesecurity portfolio, services, and value propositions of Microsoft and its competitors in customer conversations and to propose and coach others to developnew solutionsto scale across multiple customers whiledemonstrating
  • Creates opportunities to expand or acceleratesecurity usage andconsumption (including throughsecurityrelated managed intellectual property [VBD, DE, EDE
  • ’s Security
  • Technical Leadership
  • Leverages market insights toassistleadership in defining globalsecurityvision byidentifyingrelevant areas in which to drive up-skilling. Role models effectivesecurityskillingand influences team to drive their own technical readiness. Drives and engages others to adapt to changes aligned withSApriorities. Acts as a mentor to less experienced colleagues by educating them onsecurityandprofessional developmentalconcepts and sharing best practices.
  • security
  • Organizes or presents at internal/industrysecurityevents (e.g., Ready, Build, Ignite, RSA, etc.). Demonstrates deep industry knowledge and drives recognition for Microsoft solutions through presentations and engagements with external audiences. Participates in externalsecurity