Microsoft Security Consultant|| Houston TX at Jacksonville, Florida, USA |
Email: [email protected] |
From: david, Fluxtek solutions [email protected] Reply to: [email protected] Job Title:Microsoft Security Consultant Location: Jacksonville, FL 95% remote, possibility of a few trips for project milestones Start Date: immediately Duration: Long Term Kraton understands that this could be two different types of resources. It would be great, if we found 1 person with all the right experience. Please have consultants submit review the project requirements and provide a high level estimate of hours for the work. Kraton understands this will just be a ballpark estimate. Client: Kraton Location: Jacksonville, FL 95% remote, possibility of a few trips for project milestones Start Date: immediately Duration: 6 month contract initially, with extensions they have a long project list to complete this year in this area Microsoft Security Consultant Kraton would like to engage a MSFT certified professional to complete the following tasks 1-4. Some background details: PhishER is the tool Kraton purchased from KnowBe4. We will be replacing it with ReliaQuests Phishing Analyzer. KnowBe4 is our phish testing, Phish Alert, and cyber training vendor. ReliaQuest is our Managed Detection and Response vendor. We want to keep the Phish Alert Tool from KNowBe4 (it is integrated with our email system). Instead of the Phish Alert Button routing to the KNowBe4 PhishER platform, it will rout it to ReliaQuest Phish Analyzer. The Phish Alert Button is how users report Phishing Emails. Efforts needed 1.) Migrate Inky Phish Policies to Microsoft, decommission Inky. Provide testing evidence. PhishER is the tool Kraton used from KnowBe4. We would like to replace it with ReliaQuests Phishing Analyzer. To support this, we need to migrate Inky Phish policies to Microsoft tools. Once we have successfully migrated the policies to Microsoft, we need to decommission Inky. Test that inky is no longer in place and provide results back to Kraton. 2.) Obtain Phish Analyzer (RQ) from PhishER and install and test solution. Phish Analyzer (RQ) is a Security Orchestration, Automation, and Response (SOAR) platform that manages emails that our users report. It is part of KnowBe4s PhishER suite of tools. The effort is to obtain, install and test Phish Analyzer (RQ). We need to purchase the same number of seats for both PhishER and KMSAT products. We will need an email forwarding system to use so that all users reported emails can be forwarded to the PhishER Inbox for analysis. We want to keep the Phish Alert Tool from KNowBe4 (it is integrated with our email system) instead of the Phish Alert Button routing to the KNowBe4 PhishER platform, it needs to rout to ReliaQuest Phish Analyzer. The Phish Alert Button is how users need to report Phishing Emails. 3.) Integrate Microsoft DLP and Varonis Data Security, Data Access Control, Data Classification. Varonis Systems, Inc. has collaborated with Microsoft to help companies safely harness the power of AI . The effort needed is to integrate Microsoft DLP and Varonis Data Security, Data Access Control and Data Classification functions. Complete testing of integrated functions that will include the following: Discover and classify data at scale (including AI-generated content) Apply Microsoft Purview Information Protection labels required for effective data loss prevention (DLP) Enforce least-privilege access controls. Monitor sensitive data activity and alert on abnormal behavior. Find and archive stale, risky data 4.) Create Security Groups for Data Access. Need security groups set up for data access. Work with Kraton to obtain security groups needed and access privileges/user rights for each security group. Assign user rights to security groups in Active Directory. Assign user rights to a security group to determine what members of that group can do within the scope of a domain or forest. Once you have created a security group and user rights. Need to test the following: You can add members to it. You can add user accounts, computer accounts, and other groups to a security group. After you have added members to a security group, you can assign permissions to the group for resources. Warm Regards David US IT Recruiting Fluxtek Solution Inc Email : [email protected] Keywords: artificial intelligence information technology Florida |
[email protected] View all |
Fri Feb 09 01:00:00 UTC 2024 |