O365 / M365 Specialist

Centurion, Gauteng, South Africa

Job Description


Job SummaryJob Purpose:Assist in the design and delivery of Microsoft solutions to meet business objectives and technical requirements, to create effective knowledge sharing, collaboration, and workflow solutions to drive the effective delivery of DevOps programmes.M365 Deployment:

  • Microsoft Endpoint Management / Microsoft Intune
  • Azure Active Directory Premium Conditional Access (AADP CA)
  • Microsoft Defender for Cloud Apps (MDC) / Microsoft Cloud App Security (MCAS)
  • Microsoft Defender Endpoint (MDE) / Microsoft Defender Advanced Threat Protection (MDATP)
  • Microsoft Purview Information Protection (MIP)
  • Microsoft Defender for Office (MDO)
  • Outlook Mobile
Provide a customized Microsoft 365 deployment service to enable
  • Microsoft Defender for Cloud Apps (MDC),
  • Microsoft Defender Endpoint (MDE),
  • Microsoft Defender for Office (MDO),
  • Microsoft Purview Information Protection (MIP),
  • Microsoft Endpoint Management / Microsoft Intune
Microsoft 365 Defender
  • Providing an overview of the Microsoft 365 security center.
  • Reviewing cross-product incidents, including focusing on what is critical by ensuring the full attack scope, impacted assets, and automated remediation actions that are grouped together.
  • Demonstrating how Microsoft 365 Defender can orchestrate the investigation of assets, users, devices, and mailboxes that might have been compromised through automated self-healing.
  • Explaining and providing examples of how customers can proactively hunt for intrusion attempts and breach activity affecting your email, data, devices, and accounts across multiple data sets.
  • Showing customers how they can review and improve their security posture holistically using Microsoft Secure Score.
Microsoft Defender for Cloud Apps
  • Configuring the portal, including:
  • scoping your deployment to select certain user groups to monitor or exclude from monitoring.
  • how to set up IP ranges and tags.
  • personalizing the end-user experience with your logo and custom messaging.
  • Integrating first-party services including:
  • Microsoft Defender for Endpoint.
  • Microsoft Purview Information Protection.
  • Setting up cloud discovery using:
  • Microsoft Defender for Endpoints.
  • Creating app tags and categories.
  • Customizing app risk scores based on your organizations priorities.
  • Sanctioning and un-sanctioning apps.
  • Reviewing the Defender for Cloud Apps and Cloud Discovery dashboards.
  • Enabling the app governance add-on.
  • guide the customer through the overview page and create up to five (5) app governance policies.
  • connecting featured apps using app connectors.
  • Protecting apps with Conditional Access App Control in the Conditional Access within Azure AD and Defender for Cloud Apps portals
  • Deploying Conditional Access App Control for featured apps.
  • Using the activity and file logs.
  • Managing OAuth apps.
  • Reviewing and configuring policy templates.
  • Providing configuration assistance with the top twenty use cases for CASBs (including the creation or updating of up to six (6) policies) except:
  • Auditing the configuration of your internet as a service (IaaS) environment (#18).
  • Monitoring user activities to protect against threats in your IaaS environments (#19).
  • Understanding incident correlation in the Microsoft 365 Defender portal.
Microsoft Defender for Endpoint
  • Assessing the OS version and device management (including Microsoft Endpoint Manager, Microsoft Endpoint Configuration Manager, Group Policy Objects (GPOs), and third-party configurations) as well as the status of your Windows Defender AV services or other endpoint security software.
  • Onboarding Microsoft Defender for Endpoint P1 and P2 customers (including those with Windows 365 Cloud PC).
  • Providing recommended configuration guidance for Microsoft traffic to travel through proxies and firewalls restricting network traffic for devices that cannot connect directly to the internet.
  • Enabling the Microsoft Defender for Endpoint service
  • Deployment guidance, configuration assistance, and education on:
  • Block at First Sight
  • Centralized Management
  • Cross-Platform Support
  • Defender for Cloud Apps Integration
  • Enhanced ASR
  • Manual Response Actions
  • Mobile Threat Defense
  • Next Gen Protection
  • Tamper Protection
  • Web Content Filtering
  • Integrating Microsoft Defender for Cloud Apps with Microsoft Defender for Endpoint.
  • Conduct walkthroughs of the Microsoft 365 Defender portal.
  • Onboarding and configuration of the following operating systems:
  • Mobile devices (Android and iOS).
  • Windows 10
  • Windows 11
Microsoft Defender for Office 365Provide remote guidance for:
  • Reviewing Defender for Office 365 Recommended Configuration Analyzer (ORCA).
  • Setting up evaluation mode.
  • Enabling Safe Links (including Safe Documents), Safe Attachments, anti-phishing, pre-set security, and quarantine policies.
  • Understanding reporting and threat analytics.
  • Reviewing automation, investigation, and response.
  • Using Attack Simulator.
  • Configuring user-reported message settings.
  • Understanding incident correlation in the Microsoft 365 Defender portal.
Microsoft Endpoint Manager (Intune)Provides remote guidance on getting ready to use Intune as the cloud-based mobile device management (MDM) and mobile app management (MAM) provider for your apps and devices. The exact steps depend on your source environment and are based on your mobile device and mobile app management needs. The steps can include:
  • Licensing your end users.
  • Configuring identities to use by Intune by leveraging either your on-premises Active Directory or cloud identities (Azure AD).
  • Adding users to your Intune subscription, defining IT admin roles, and creating user and device groups.
  • Configuring your MDM authority, based on your management needs, including:
  • Setting Intune as your MDM authority when Intune is your only MDM solution.
  • Providing MDM guidance for:
  • Configuring tests groups to use to validate MDM management policies.
  • Configuring MDM management policies and services like:
  • App deployment for each supported platform through web links or deep links.
  • Conditional Access policies.
  • Deployment of email, wireless networks, and VPN profiles if you have an existing certificate authority, wireless network, or VPN infrastructure in your organization.
  • Connecting to the Intune Data Warehouse.
  • Enrolling devices of each supported platform to Intune.
  • Providing app protection guidance on:
  • Configuring app protection policies for each supported platform.
  • Configuring Conditional Access policies for managed apps.
  • Targeting the appropriate user groups with the previously mentioned MAM policies.
  • Using managed-apps usage reports.
  • Providing migration guidance from legacy PC management to Intune MDM.
Microsoft Purview Compliance ManagerProvide remote guidance for:
  • Reviewing role types
  • Adding and configuring assessments.
  • Assessing compliance by implementing improvement actions and determining how this impacts your compliance score.
  • Reviewing built-in control mapping and assessing controls.
  • Generating a report within an assessment.
Microsoft Purview Information Protection
  • Activating and configuring your tenant.
  • Data classification
  • Sensitive information types
  • Creating sensitivity labels
  • Applying sensitivity labels
  • Creating DLP policies for Microsoft Teams chats and channels.
  • Creating and setting up labels and policies
  • Applying information protection to documents
  • Discovering and labelling files at rest using the Microsoft Purview Information Protection scanner
  • Monitoring emails in transit using Exchange Online mail flow rules.
  • Migration guidance from Azure Information Protection add-in to built-in labelling for Office apps
  • Customer Key / Lockbox
  • Advanced data governance
  • Communication Compliance
  • Advanced Audit (1yr retention, auto log policies)
  • Advanced eDiscovery
Microsoft Purview Data Lifecycle Management and Records Management
  • Creating and applying Basic retention policies
  • Creating and publishing Basic retention labels
DotComRecruiter

Job Mail

Beware of fraud agents! do not pay money to get a job

MNCJobs.co.za will not be responsible for any payment made to a third-party. All Terms of Use are applicable.


Job Detail

  • Job Id
    JD1361786
  • Industry
    Not mentioned
  • Total Positions
    1
  • Job Type:
    Full Time
  • Salary:
    Not mentioned
  • Employment Status
    Permanent
  • Job Location
    Centurion, Gauteng, South Africa
  • Education
    Not mentioned